SHARE
Facebook X Pinterest WhatsApp

Ixia’s 2018 Security Report Sees Clouds in the Cloud for IT Teams

thumbnail
Ixia’s 2018 Security Report Sees Clouds in the Cloud for IT Teams

Keysight Technologies’s Ixia team has released their Ixia 2018 Security Report. The downside of the cloud and the dangers of crypto-jacking are issues.

Written By
thumbnail
Amanda Razani
Amanda Razani
May 4, 2018

The cloud is throwing shade on enterprise IT security, says Keysight Technologies’ subsidiary Ixia in their 2018 Security Report.

This report shares the company’s primary security findings throughout the past year from its Application and Threat Intelligence Research Center. The report analyzes the increasing exposure to cybersecurity risks as enterprises manage more of their workloads inside the cloud.

This is the second annual Ixia 2018 Security Report, and it comes as a result of the company’s vast experience in network security testing, along with the company’s dedication to network and cloud visibility. This level of expertise has allowed Ixia to intensely study an enterprises’ increasing network attack surface, as the perimeter of the traditional enterprise expands into the cloud.

See also: IIC’s IoT Security Maturity Model Helps Fine-Tune Spending

Jeff Harris, vice president, portfolio marketing, Keysight Technologies, shares, “Enterprises are now running business-critical applications and services in the cloud, and this report highlights the need for changes in the way enterprises secure their data and applications. Operating in the cloud changes security requirements. Enterprises need a strong security regimen that includes continuous testing as well as visibility down to the packet level to identify and control malicious behavior before it impacts their business.”

Some of the main discoveries from the 2018 Security Report are that cloud security and compliance are big priorities in 2018. Security teams have been impacted by the dominance of cloud, as they attempt to deliver effective security within a hybrid, ever-changing, on-demand environment. And, it’s no wonder that this is a main focus, because the gap between cloud operations and security operations is increasing.  As cyber attacks evolve, more focus needs to be placed on visibility and detection.

This year, crypto-jacking is a big concern.  In fact, AdGuard researchers have shared that more than 500 million PCs are secretly being used for crypto-mining, and the profit made by hackers can be very large. Some would think that encryption is the answer, yet hackers are exploiting the encryption trend by hiding malware in encrypted streams.

Ixia’s parent, Keysight Technologies, assists governments, enterprises and service providers with accelerating innovation to connect and secure their assets. To read the full report, you can visit this website: https://www.ixiacom.com/resources/2018-security-report

Recommended for you...

Data Immediacy’s Next Step
Smart Talk Episode 9: Apache Iceberg and Streaming Data Architectures
Smart Talk Episode 5: Disaggregation of the Observability Stack
Smart Talk Episode 4: Real-Time Data and Vector Databases

Featured Resources from Cloud Data Insights

Cloud Evolution 2026: Strategic Imperatives for Chief Data Officers
Why Network Services Need Automation
The Shared Responsibility Model and Its Impact on Your Security Posture
The Role of Data Governance in ERP Systems
Sandip Roy
Nov 28, 2025
RT Insights Logo

Analysis and market insights on real-time analytics including Big Data, the IoT, and cognitive computing. Business use cases and technologies are discussed.

Property of TechnologyAdvice. © 2026 TechnologyAdvice. All Rights Reserved

Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.