Ixia's 2018 Security Report Sees Clouds in the Cloud for IT Teams - RTInsights

Ixia’s 2018 Security Report Sees Clouds in the Cloud for IT Teams

Ixia’s 2018 Security Report Sees Clouds in the Cloud for IT Teams

Keysight Technologies’s Ixia team has released their Ixia 2018 Security Report. The downside of the cloud and the dangers of crypto-jacking are issues.

Written By
Amanda Razani
Amanda Razani
May 4, 2018
2 minute read

The cloud is throwing shade on enterprise IT security, says Keysight Technologies’ subsidiary Ixia in their 2018 Security Report.

This report shares the company’s primary security findings throughout the past year from its Application and Threat Intelligence Research Center. The report analyzes the increasing exposure to cybersecurity risks as enterprises manage more of their workloads inside the cloud.

This is the second annual Ixia 2018 Security Report, and it comes as a result of the company’s vast experience in network security testing, along with the company’s dedication to network and cloud visibility. This level of expertise has allowed Ixia to intensely study an enterprises’ increasing network attack surface, as the perimeter of the traditional enterprise expands into the cloud.

See also: IIC’s IoT Security Maturity Model Helps Fine-Tune Spending

Jeff Harris, vice president, portfolio marketing, Keysight Technologies, shares, “Enterprises are now running business-critical applications and services in the cloud, and this report highlights the need for changes in the way enterprises secure their data and applications. Operating in the cloud changes security requirements. Enterprises need a strong security regimen that includes continuous testing as well as visibility down to the packet level to identify and control malicious behavior before it impacts their business.”

Some of the main discoveries from the 2018 Security Report are that cloud security and compliance are big priorities in 2018. Security teams have been impacted by the dominance of cloud, as they attempt to deliver effective security within a hybrid, ever-changing, on-demand environment. And, it’s no wonder that this is a main focus, because the gap between cloud operations and security operations is increasing.  As cyber attacks evolve, more focus needs to be placed on visibility and detection.

This year, crypto-jacking is a big concern.  In fact, AdGuard researchers have shared that more than 500 million PCs are secretly being used for crypto-mining, and the profit made by hackers can be very large. Some would think that encryption is the answer, yet hackers are exploiting the encryption trend by hiding malware in encrypted streams.

Ixia’s parent, Keysight Technologies, assists governments, enterprises and service providers with accelerating innovation to connect and secure their assets. To read the full report, you can visit this website: https://www.ixiacom.com/resources/2018-security-report

Featured Resources from Cloud Data Insights

Why Network Architecture is the Real Constraint on Real-Time AI
Michael Reid
May 11, 2026
Lyrie.ai Deploys Real-Time Zero-Day Tracking Across Global Enterprise Infrastructure
TechnologyWire
May 11, 2026
Real-time Analytics News for the Week Ending May 9
Why AI Needs a High Fiber Diet
RT Insights Logo

Analysis and market insights on real-time analytics including Big Data, the IoT, and cognitive computing. Business use cases and technologies are discussed.

Property of TechnologyAdvice. © 2026 TechnologyAdvice. All Rights Reserved

Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.