Ixia brags to ensures application performance and security resiliency

Ixia enables the high performance of modern data centers, with a fraction of the previously required resources, with its new PerfectStorm validation and testing platform. As complex applications and virtualization continue to increase data center infrastructure risks, PerfectStorm, within a single chassis, mitigates against these risks by generating real application and malicious traffic at scales of nearly one terabit. PerfectStorm also scales to handle high session rates, supporting 24 million connections per a second and up to 720 million concurrent sessions, similar to the nearly every person in Europe initiating an Internet search.


Enterprises, service providers, data center operators and network equipment manufacturers delivering mission-critical applications are deploying complex, leading-edge technologies to help keep pace with increasing business and end-user requirements. This, along with the need for flexible scalability, means organizations need to validate the data center infrastructure to ensure it will perform and remain secure under peak loads without overstressing finite resources. 

Data center operators and network equipment manufacturers demand systems that perform at the levels required to test and ensure the resiliency of the data center infrastructure. The PerfectStorm platform is the only system that provides modular scalability, achieving near terabit levels of mixed application and malicious traffic to securely test all elements of today’s complex data centers, including server applications, storage workloads and networking elements.

In a single 11U chassis, PerfectStorm enables comprehensive data center validation by seamlessly unifying the IxLoad and BreakingPoint software applications into a single system to deliver:

·         Unprecedented data center testing performance with nearly a terabit of traffic equaling 720 million concurrent TCP sessions at 24 million sessions per second.

·         960 Gbps of blended application traffic, including over 200 application protocols and over 35,000 malicious attacks, to validate every element of the data center with confidence, including applications, security, storage, networking, voice and video, at any scale with a single platform.

Comments