SlideShare a Scribd company logo
1 of 20
Download to read offline
WE MAKE
APPLICATIONS STRONGER
2015
TEST. SECURITY. VISIBILITY.
| COPYRIGHT 2015 | CONFIDENTIAL2
THE
EXPERIENCE
IS AMAZING…
WHEN APPS ARE
RELIABLE
FAST
SECURE
STRONG
THE MODERN APPLICATION ENVIRONMENT
More Devices
More Data
More to Secure
ERP
SaaS
IoT
CRM
SaaS
Compliance
User AuthHR Info
System
Security
Sandbox
IaaS
EnterpriseAPP
| COPYRIGHT 2015 | CONFIDENTIAL3
Market Trends
CREATING APP VULNERABILITIES
GROWTH IN CLOUD
OUTSOURCING
BY 2018
100%
BILLION
CONNECTED
DEVICES BY 2018
9
INTERNET
OF THINGS
CLOUD
NETWORK
SECURITY
BIG DATA
ENTERPRISE
DATA GROWTH
2014 TO 2020
50xGROWTH IN
GLOBAL SECURITY
INCIDENTS
48%
| COPYRIGHT 2015 | CONFIDENTIAL4
CUSTOMER PAIN POINTS
THE COST OF POORLY DESIGNED, UNMONITORED, AND UNSECURED NETWORK:
Jeep Hack
Forces 1.4M
Recalls; Drives
Congress
to Action
OPM Hack:
4 Million
Government
Workers
Completely
Exposed
2.5 million people
have medical
device implants
with WiFi. Was
yours fully tested?
Ashley
Madison
Breach: 35M
Very Personal
Records
Exposed
| COPYRIGHT 2015 | CONFIDENTIAL5
Provide 100% visibility
Deliver real-time intelligence
Eliminate blind spots
WE MAKE APPLICATIONS RUN STRONGER
We challenge the infrastructure, harden security
and visualize the applications
VISIBILITY
Harden infrastructure
Validate app performance
Verify provisioning
TEST SECURITY
| COPYRIGHT 2015 | CONFIDENTIAL6
Surface vulnerabilities
Provide failsafe security
Reduce attack surface
3-year ops savings for installing
visibility framework and a
10X ROI
$800K
Annual OPEX savings and 15X
ROI by installing ThreatARMOR
as first line of defense
$300K
OPEX savings and 4X ROI by
validating vCPE
without truck rolls
$500K
WE MAKE APPLICATIONS RUN STRONGER
A better foundation leads to lower cost of ownership
VISIBILITYTEST SECURITY
| COPYRIGHT 2015 | CONFIDENTIAL7
| COPYRIGHT 2015 | CONFIDENTIAL8
1 SEC
AVG DELAY IN RESPONSE TIME
7% REDUCTION
IN CONVERSIONS
=
If an e-commerce site is making $100,000 per day,
a 1 second page delay could potentially cost you
$2.5 MILLION IN LOST SALES EVERY YEAR
WHAT IS THE BUSINESS IMPACT?
POOR APPLICATION PERFORMANCE 9% REDUCTION IN
CORPORATE REVENUEA Hart Hanks Company
Across the Infrastructure
Across ALL Platforms
Data CenterNetwork Cloud
END-TO-END
APPLICATION STRENGTHENING
Mobile Endpoint
| COPYRIGHT 2015 | CONFIDENTIAL9
Flex Taps, iBypass,
Virtual Taps
802.11ac,
MU-MIMO
PerfectStorm
BPS vEPC
IxLoad/VE
NTO 73xx, 52xx
ATIP,
xStream40, Control
Tower
IxNetwork/VE
Multis SDN
ThreatARMOR
ENTERPRISESERVICE PROVIDERSNEMs
75
OF THE
FORTUNE 100
WE ARE PROUD TO SERVE
| COPYRIGHT 201510
45
OF THE
TOP 50 CARRIERS
15
OF THE
TOP 15 NEMS
Customers need to validate their network architecture to ensure they have a well-designed network,
properly provisioned, with the right third party equipment to achieve their business goals.
TEST
VNF VNF
VNF
VALIDATE NETWORK DESIGN
Real-world traffic provided by Xcellon
modules and IxLoad application
RESULT: Zero network downtime
since deployment
CASE STUDY: US Software Company
| COPYRIGHT 2015 | CONFIDENTIAL11
SECURE NETWORK ROLLOUT
Customers must validate network performance and secure their network against all the various
threat scenarios—a threat list that grows daily and impacts their end users, brand, and profitability.
SECURITY
Rollout, adapt, and secure a new worldwide
mobile payment services
RESULT: 20 vulnerabilities &
misconfigurations found in first 24 hours;
may have cost millions
CASE STUDY: Global Credit Card
Company
| COPYRIGHT 2015 | CONFIDENTIAL12
SECURE CRITICAL DATA
Leading financial and health institutions worldwide need to comply with fast-changing
national and industry regulations while ensuring security and controlling costs.
SECURITY
COMPLIANCE AND REGULATION
Stop PCI DSS monthly violation fees and
reduce ongoing cost with Ixia inline security
RESULT: $3M saving in tool costs
for a 10X ROI
CASE STUDY: Global Payment
Services Company
| COPYRIGHT 2015 | CONFIDENTIAL13
Provide 100% visibility into traffic to eliminate blind spots. Monitor applications traffic and
receive real-time intelligence in order to ensure the network is performing as expected.
VISIBILITY
OPTIMIZE NETWORK
PERFORMANCE
Simplified the oversight and reduced load
on OPNET tools when they migrated from
10GbE to 40GbE data center links
RESULT: 20% to 30% savings on
IDS capacity; 100% RoI
CASE STUDY: Major European Bank
| COPYRIGHT 2015 | CONFIDENTIAL14
TOTAL
$464
MILLION
IXIA’S STRENGTH AND GLOBAL REACH
2014 Revenue By Geography
$300M
AMERICAS $67M
EUROPE
ASIA
$97M
| COPYRIGHT 2015 | CONFIDENTIAL15
WORLD-CLASS GLOBAL SUPPORT
| COPYRIGHT 2015 | CONFIDENTIAL16
Expert team of
>100 engineers
Proven track record
of superior support
Always-on 24x7
coverage
Best-in-class
support tools
Applications & Security Test
(L4-7)
Wireline Test (L2-3)
WiFi Test
NPB Security
Network Taps
Network Packet
Broker Solutions
LTE Test
10G, 25G, 40G, 100G, 400G
Virtual Tap
~ 400 Patents:
Pending and issued
MARKET LEADER
#1
MARKET LEADERSHIP AND INNOVATION
TO MARKET
#1 MARKET LEADER
#2
| COPYRIGHT 2015 | CONFIDENTIAL17
OUR CULTURE, EMPLOYEES
AND GO-TO-MARKET ARE OUR STRENGTH
6,000
CUSTOMERS
MORE THAN
20+COUNTRIES
WITH OPS
40+TECHNOLOGY
PARTNERS
1,700+
EMPLOYEES
400+
CHANNEL
PARTNERS
Ixia has long-term relationships with customers and partners
| COPYRIGHT 2015 | CONFIDENTIAL18
THE IXIA DIFFERENCE
Seamlessly and securely deliver a quality
experience to your customers
Comprehensive
solutions portfolio to
validate, secure, and
optimize the complete
network lifecycle
C O M P R E H E N S I V E
S O L U T I O N S
Professional services
and support to ensure
successful deployment
and operations 24/7
P R O F E S S I O N A L
S E R V I C E S
Extensive global
partner base to deliver
solutions to customers
worldwide
G L O B A L
PA R T N E R S
Industry-first solutions
developed to provide
value in both virtual and
physical environments
C O M P R E H E N S I V E
T E C H N O L O G Y
| COPYRIGHT 2015 | CONFIDENTIAL19
TEST. VISIBILITY. SECURITY.
THANK YOU

More Related Content

What's hot

What's hot (20)

Cisco connect winnipeg 2018 understanding cisco's next generation sdwan sol...
Cisco connect winnipeg 2018   understanding cisco's next generation sdwan sol...Cisco connect winnipeg 2018   understanding cisco's next generation sdwan sol...
Cisco connect winnipeg 2018 understanding cisco's next generation sdwan sol...
 
Cisco Connect Halifax 2018 Simple IT
Cisco Connect Halifax 2018   Simple ITCisco Connect Halifax 2018   Simple IT
Cisco Connect Halifax 2018 Simple IT
 
Cisco Connect Toronto 2017 - Understanding Cisco Next Generation SD-WAN
Cisco Connect Toronto 2017 - Understanding Cisco Next Generation SD-WANCisco Connect Toronto 2017 - Understanding Cisco Next Generation SD-WAN
Cisco Connect Toronto 2017 - Understanding Cisco Next Generation SD-WAN
 
Cisco connect montreal 2018 secure dc
Cisco connect montreal 2018    secure dcCisco connect montreal 2018    secure dc
Cisco connect montreal 2018 secure dc
 
Cisco Connect Toronto 2018 IOT - unlock the power of data - securing the in...
Cisco Connect Toronto 2018   IOT - unlock the power of data - securing the in...Cisco Connect Toronto 2018   IOT - unlock the power of data - securing the in...
Cisco Connect Toronto 2018 IOT - unlock the power of data - securing the in...
 
Cisco Connect Halifax 2018 Accelerating the secure digital business through...
Cisco Connect Halifax 2018   Accelerating the secure digital business through...Cisco Connect Halifax 2018   Accelerating the secure digital business through...
Cisco Connect Halifax 2018 Accelerating the secure digital business through...
 
Putting firepower into the next generation firewall
Putting firepower into the next generation firewallPutting firepower into the next generation firewall
Putting firepower into the next generation firewall
 
TechWiseTV Workshop: Extending Intent-Based Networking to IoT
TechWiseTV Workshop: Extending Intent-Based Networking to IoTTechWiseTV Workshop: Extending Intent-Based Networking to IoT
TechWiseTV Workshop: Extending Intent-Based Networking to IoT
 
Cisco Connect Toronto 2018 DNA assurance
Cisco Connect Toronto 2018  DNA assuranceCisco Connect Toronto 2018  DNA assurance
Cisco Connect Toronto 2018 DNA assurance
 
Cisco Connect Toronto 2018 sixty to zero
Cisco Connect Toronto 2018   sixty to zeroCisco Connect Toronto 2018   sixty to zero
Cisco Connect Toronto 2018 sixty to zero
 
Cisco Digital Network Architecture – Deeper Dive, “From the Gates to the GUI
Cisco Digital Network Architecture – Deeper Dive, “From the Gates to the GUICisco Digital Network Architecture – Deeper Dive, “From the Gates to the GUI
Cisco Digital Network Architecture – Deeper Dive, “From the Gates to the GUI
 
Cisco Connect Toronto 2017 - Anatomy-of-attack
Cisco Connect Toronto 2017 - Anatomy-of-attackCisco Connect Toronto 2017 - Anatomy-of-attack
Cisco Connect Toronto 2017 - Anatomy-of-attack
 
Cisco connect winnipeg 2018 we make it simple
Cisco connect winnipeg 2018   we make it simpleCisco connect winnipeg 2018   we make it simple
Cisco connect winnipeg 2018 we make it simple
 
TechWiseTV Workshop: Cisco Hybrid Cloud Platform for Google Cloud
TechWiseTV Workshop:  Cisco Hybrid Cloud Platform for Google CloudTechWiseTV Workshop:  Cisco Hybrid Cloud Platform for Google Cloud
TechWiseTV Workshop: Cisco Hybrid Cloud Platform for Google Cloud
 
TechWiseTV Workshop: Cisco Catalyst 9800 Series Wireless Controller
TechWiseTV Workshop: Cisco Catalyst 9800 Series Wireless ControllerTechWiseTV Workshop: Cisco Catalyst 9800 Series Wireless Controller
TechWiseTV Workshop: Cisco Catalyst 9800 Series Wireless Controller
 
Incredible Compute Density: Cisco DNA Center Platform: Digging Deeper with APIs
Incredible Compute Density: Cisco DNA Center Platform: Digging Deeper with APIsIncredible Compute Density: Cisco DNA Center Platform: Digging Deeper with APIs
Incredible Compute Density: Cisco DNA Center Platform: Digging Deeper with APIs
 
Cisco Connect Toronto 2017 - Accelerating Incident Response in Organizations...
Cisco Connect Toronto  2017 - Accelerating Incident Response in Organizations...Cisco Connect Toronto  2017 - Accelerating Incident Response in Organizations...
Cisco Connect Toronto 2017 - Accelerating Incident Response in Organizations...
 
Cisco Connect Toronto 2018 DNA automation-the evolution to intent-based net...
Cisco Connect Toronto 2018   DNA automation-the evolution to intent-based net...Cisco Connect Toronto 2018   DNA automation-the evolution to intent-based net...
Cisco Connect Toronto 2018 DNA automation-the evolution to intent-based net...
 
Cisco Meraki - Simplifying Powerful Technology
Cisco Meraki - Simplifying Powerful TechnologyCisco Meraki - Simplifying Powerful Technology
Cisco Meraki - Simplifying Powerful Technology
 
Cisco Connect Halifax 2018 Accelerating incident response in organizations...
Cisco Connect Halifax 2018   Accelerating incident  response in organizations...Cisco Connect Halifax 2018   Accelerating incident  response in organizations...
Cisco Connect Halifax 2018 Accelerating incident response in organizations...
 

Similar to Ixia Customer Presentation

End to End Security - Check Point
End to End Security - Check PointEnd to End Security - Check Point
End to End Security - Check Point
Harry Gunns
 
How IoT Will Support Tomorrow's Digital Supply Chain
How IoT Will Support Tomorrow's Digital Supply ChainHow IoT Will Support Tomorrow's Digital Supply Chain
How IoT Will Support Tomorrow's Digital Supply Chain
SCL HUB
 
How IoT Will Support Tomorrow's Digital Supply Chain
How IoT Will Support Tomorrow's Digital Supply ChainHow IoT Will Support Tomorrow's Digital Supply Chain
How IoT Will Support Tomorrow's Digital Supply Chain
SCL HUB Conference
 
[Webinar] – Social Distancing Radar: Smart AI Solution to Restart Your Business
[Webinar] – Social Distancing Radar: Smart AI Solution to Restart Your Business[Webinar] – Social Distancing Radar: Smart AI Solution to Restart Your Business
[Webinar] – Social Distancing Radar: Smart AI Solution to Restart Your Business
JK Tech
 
V2COM Inc. Offer to Partners (V2COM) (1)
V2COM Inc. Offer to Partners (V2COM) (1)V2COM Inc. Offer to Partners (V2COM) (1)
V2COM Inc. Offer to Partners (V2COM) (1)
Silverio A. Sierra
 
Newsletter VoIP, entrevista a Fidel Salgueiro
Newsletter VoIP, entrevista a Fidel SalgueiroNewsletter VoIP, entrevista a Fidel Salgueiro
Newsletter VoIP, entrevista a Fidel Salgueiro
Fidel Angel Salgueiro
 

Similar to Ixia Customer Presentation (20)

Chris Swan's presentation from the London Tech Entrepreneurs' Meetup
Chris Swan's presentation from the London Tech Entrepreneurs' MeetupChris Swan's presentation from the London Tech Entrepreneurs' Meetup
Chris Swan's presentation from the London Tech Entrepreneurs' Meetup
 
Learning from Industry Cloud Leaders
Learning from Industry Cloud LeadersLearning from Industry Cloud Leaders
Learning from Industry Cloud Leaders
 
06 - VMUGIT - Lecce 2018 - Rodolfo Rotondo, VMware
06 - VMUGIT - Lecce 2018 - Rodolfo Rotondo, VMware06 - VMUGIT - Lecce 2018 - Rodolfo Rotondo, VMware
06 - VMUGIT - Lecce 2018 - Rodolfo Rotondo, VMware
 
How Schneider Electric Assures Its Salesforce Lightning Migration with Thousa...
How Schneider Electric Assures Its Salesforce Lightning Migration with Thousa...How Schneider Electric Assures Its Salesforce Lightning Migration with Thousa...
How Schneider Electric Assures Its Salesforce Lightning Migration with Thousa...
 
OT - Getting the Most From Your B2B Network - SS14
OT - Getting the Most From Your B2B Network - SS14OT - Getting the Most From Your B2B Network - SS14
OT - Getting the Most From Your B2B Network - SS14
 
Innovation and the Internet of Things - Emeka Nwafor (Wind River Systems)
Innovation and the Internet of Things - Emeka Nwafor (Wind River Systems)Innovation and the Internet of Things - Emeka Nwafor (Wind River Systems)
Innovation and the Internet of Things - Emeka Nwafor (Wind River Systems)
 
Simplify and secure your path to the multicloud future
Simplify and secure your path to the multicloud futureSimplify and secure your path to the multicloud future
Simplify and secure your path to the multicloud future
 
End to End Security - Check Point
End to End Security - Check PointEnd to End Security - Check Point
End to End Security - Check Point
 
The New Style of Business
The New Style of Business The New Style of Business
The New Style of Business
 
Case Study: Intel Corporation - The Benefits of, and Need for Agile Operation...
Case Study: Intel Corporation - The Benefits of, and Need for Agile Operation...Case Study: Intel Corporation - The Benefits of, and Need for Agile Operation...
Case Study: Intel Corporation - The Benefits of, and Need for Agile Operation...
 
How IoT Will Support Tomorrow's Digital Supply Chain
How IoT Will Support Tomorrow's Digital Supply ChainHow IoT Will Support Tomorrow's Digital Supply Chain
How IoT Will Support Tomorrow's Digital Supply Chain
 
How IoT Will Support Tomorrow's Digital Supply Chain
How IoT Will Support Tomorrow's Digital Supply ChainHow IoT Will Support Tomorrow's Digital Supply Chain
How IoT Will Support Tomorrow's Digital Supply Chain
 
[Webinar] – Social Distancing Radar: Smart AI Solution to Restart Your Business
[Webinar] – Social Distancing Radar: Smart AI Solution to Restart Your Business[Webinar] – Social Distancing Radar: Smart AI Solution to Restart Your Business
[Webinar] – Social Distancing Radar: Smart AI Solution to Restart Your Business
 
AWS Summit Singapore - Opening Keynote by Dr. Werner Vogels
AWS Summit Singapore - Opening Keynote by Dr. Werner VogelsAWS Summit Singapore - Opening Keynote by Dr. Werner Vogels
AWS Summit Singapore - Opening Keynote by Dr. Werner Vogels
 
V2COM Inc. Offer to Partners (V2COM) (1)
V2COM Inc. Offer to Partners (V2COM) (1)V2COM Inc. Offer to Partners (V2COM) (1)
V2COM Inc. Offer to Partners (V2COM) (1)
 
Modern App Architecture - Microservices, API Friendly
Modern App Architecture - Microservices, API FriendlyModern App Architecture - Microservices, API Friendly
Modern App Architecture - Microservices, API Friendly
 
2019 06-26 effective multi-vendor management -fortinet algo sec webinar final
2019 06-26 effective multi-vendor management -fortinet algo sec webinar final2019 06-26 effective multi-vendor management -fortinet algo sec webinar final
2019 06-26 effective multi-vendor management -fortinet algo sec webinar final
 
100%-ный контроль для 100%-ной безопасности
100%-ный контроль для 100%-ной безопасности100%-ный контроль для 100%-ной безопасности
100%-ный контроль для 100%-ной безопасности
 
Newsletter VoIP, entrevista a Fidel Salgueiro
Newsletter VoIP, entrevista a Fidel SalgueiroNewsletter VoIP, entrevista a Fidel Salgueiro
Newsletter VoIP, entrevista a Fidel Salgueiro
 
Huawei Argentina - Presentación #ITResellers100
Huawei Argentina - Presentación #ITResellers100Huawei Argentina - Presentación #ITResellers100
Huawei Argentina - Presentación #ITResellers100
 

Ixia Customer Presentation

  • 2. | COPYRIGHT 2015 | CONFIDENTIAL2 THE EXPERIENCE IS AMAZING… WHEN APPS ARE RELIABLE FAST SECURE STRONG
  • 3. THE MODERN APPLICATION ENVIRONMENT More Devices More Data More to Secure ERP SaaS IoT CRM SaaS Compliance User AuthHR Info System Security Sandbox IaaS EnterpriseAPP | COPYRIGHT 2015 | CONFIDENTIAL3
  • 4. Market Trends CREATING APP VULNERABILITIES GROWTH IN CLOUD OUTSOURCING BY 2018 100% BILLION CONNECTED DEVICES BY 2018 9 INTERNET OF THINGS CLOUD NETWORK SECURITY BIG DATA ENTERPRISE DATA GROWTH 2014 TO 2020 50xGROWTH IN GLOBAL SECURITY INCIDENTS 48% | COPYRIGHT 2015 | CONFIDENTIAL4
  • 5. CUSTOMER PAIN POINTS THE COST OF POORLY DESIGNED, UNMONITORED, AND UNSECURED NETWORK: Jeep Hack Forces 1.4M Recalls; Drives Congress to Action OPM Hack: 4 Million Government Workers Completely Exposed 2.5 million people have medical device implants with WiFi. Was yours fully tested? Ashley Madison Breach: 35M Very Personal Records Exposed | COPYRIGHT 2015 | CONFIDENTIAL5
  • 6. Provide 100% visibility Deliver real-time intelligence Eliminate blind spots WE MAKE APPLICATIONS RUN STRONGER We challenge the infrastructure, harden security and visualize the applications VISIBILITY Harden infrastructure Validate app performance Verify provisioning TEST SECURITY | COPYRIGHT 2015 | CONFIDENTIAL6 Surface vulnerabilities Provide failsafe security Reduce attack surface
  • 7. 3-year ops savings for installing visibility framework and a 10X ROI $800K Annual OPEX savings and 15X ROI by installing ThreatARMOR as first line of defense $300K OPEX savings and 4X ROI by validating vCPE without truck rolls $500K WE MAKE APPLICATIONS RUN STRONGER A better foundation leads to lower cost of ownership VISIBILITYTEST SECURITY | COPYRIGHT 2015 | CONFIDENTIAL7
  • 8. | COPYRIGHT 2015 | CONFIDENTIAL8 1 SEC AVG DELAY IN RESPONSE TIME 7% REDUCTION IN CONVERSIONS = If an e-commerce site is making $100,000 per day, a 1 second page delay could potentially cost you $2.5 MILLION IN LOST SALES EVERY YEAR WHAT IS THE BUSINESS IMPACT? POOR APPLICATION PERFORMANCE 9% REDUCTION IN CORPORATE REVENUEA Hart Hanks Company
  • 9. Across the Infrastructure Across ALL Platforms Data CenterNetwork Cloud END-TO-END APPLICATION STRENGTHENING Mobile Endpoint | COPYRIGHT 2015 | CONFIDENTIAL9 Flex Taps, iBypass, Virtual Taps 802.11ac, MU-MIMO PerfectStorm BPS vEPC IxLoad/VE NTO 73xx, 52xx ATIP, xStream40, Control Tower IxNetwork/VE Multis SDN ThreatARMOR
  • 10. ENTERPRISESERVICE PROVIDERSNEMs 75 OF THE FORTUNE 100 WE ARE PROUD TO SERVE | COPYRIGHT 201510 45 OF THE TOP 50 CARRIERS 15 OF THE TOP 15 NEMS
  • 11. Customers need to validate their network architecture to ensure they have a well-designed network, properly provisioned, with the right third party equipment to achieve their business goals. TEST VNF VNF VNF VALIDATE NETWORK DESIGN Real-world traffic provided by Xcellon modules and IxLoad application RESULT: Zero network downtime since deployment CASE STUDY: US Software Company | COPYRIGHT 2015 | CONFIDENTIAL11
  • 12. SECURE NETWORK ROLLOUT Customers must validate network performance and secure their network against all the various threat scenarios—a threat list that grows daily and impacts their end users, brand, and profitability. SECURITY Rollout, adapt, and secure a new worldwide mobile payment services RESULT: 20 vulnerabilities & misconfigurations found in first 24 hours; may have cost millions CASE STUDY: Global Credit Card Company | COPYRIGHT 2015 | CONFIDENTIAL12
  • 13. SECURE CRITICAL DATA Leading financial and health institutions worldwide need to comply with fast-changing national and industry regulations while ensuring security and controlling costs. SECURITY COMPLIANCE AND REGULATION Stop PCI DSS monthly violation fees and reduce ongoing cost with Ixia inline security RESULT: $3M saving in tool costs for a 10X ROI CASE STUDY: Global Payment Services Company | COPYRIGHT 2015 | CONFIDENTIAL13
  • 14. Provide 100% visibility into traffic to eliminate blind spots. Monitor applications traffic and receive real-time intelligence in order to ensure the network is performing as expected. VISIBILITY OPTIMIZE NETWORK PERFORMANCE Simplified the oversight and reduced load on OPNET tools when they migrated from 10GbE to 40GbE data center links RESULT: 20% to 30% savings on IDS capacity; 100% RoI CASE STUDY: Major European Bank | COPYRIGHT 2015 | CONFIDENTIAL14
  • 15. TOTAL $464 MILLION IXIA’S STRENGTH AND GLOBAL REACH 2014 Revenue By Geography $300M AMERICAS $67M EUROPE ASIA $97M | COPYRIGHT 2015 | CONFIDENTIAL15
  • 16. WORLD-CLASS GLOBAL SUPPORT | COPYRIGHT 2015 | CONFIDENTIAL16 Expert team of >100 engineers Proven track record of superior support Always-on 24x7 coverage Best-in-class support tools
  • 17. Applications & Security Test (L4-7) Wireline Test (L2-3) WiFi Test NPB Security Network Taps Network Packet Broker Solutions LTE Test 10G, 25G, 40G, 100G, 400G Virtual Tap ~ 400 Patents: Pending and issued MARKET LEADER #1 MARKET LEADERSHIP AND INNOVATION TO MARKET #1 MARKET LEADER #2 | COPYRIGHT 2015 | CONFIDENTIAL17
  • 18. OUR CULTURE, EMPLOYEES AND GO-TO-MARKET ARE OUR STRENGTH 6,000 CUSTOMERS MORE THAN 20+COUNTRIES WITH OPS 40+TECHNOLOGY PARTNERS 1,700+ EMPLOYEES 400+ CHANNEL PARTNERS Ixia has long-term relationships with customers and partners | COPYRIGHT 2015 | CONFIDENTIAL18
  • 19. THE IXIA DIFFERENCE Seamlessly and securely deliver a quality experience to your customers Comprehensive solutions portfolio to validate, secure, and optimize the complete network lifecycle C O M P R E H E N S I V E S O L U T I O N S Professional services and support to ensure successful deployment and operations 24/7 P R O F E S S I O N A L S E R V I C E S Extensive global partner base to deliver solutions to customers worldwide G L O B A L PA R T N E R S Industry-first solutions developed to provide value in both virtual and physical environments C O M P R E H E N S I V E T E C H N O L O G Y | COPYRIGHT 2015 | CONFIDENTIAL19