#StandWithUkraine

Support the Ukrainian Armed Forces during the Russian invasion

Company image

Keysight is a leading manufacturer of test equipment for IP networks, which is distributed by BAKOTECH in Ukraine and the CIS countries.


Digital transformation requires the deepest understanding of your network. Test your infrastructure on a scale with traffic simulation, test security with hacking and attack simulation, and get the visibility of each packet. Secure, reliable, and sensitive networks rely on Keysight.

Network Test

Test networks, clouds, applications, and services with traffic simulators, protocols, and load testing systems.

Networks Visibility

Make your traffic visible with network plugs, virtual cloud plugs, and smart packet network brokers.

Network Security

Continuously test network security with hacking and attack simulation tools and security testing.

Performance Monitoring

Proactively monitor user performance through active network monitoring and artificial traffic simulators.

Network testing solutions

Illustration

CyPerf

Highly scalable traffic simulation for distributed virtual, hybrid, and physical networks. Test performance on live networks or in the lab with zero trust traffic emulation, a wide range of attack simulations, tens of millions of concurrent users, and millions of connections per second.

Illustration

Cloud Peak

Virtual network infrastructure validation. Validate and benchmark VMware vCenter and OpenStack-based private clouds. Predefined test scenarios for NFVI validation. Validate from a VNF or network perspective through real workload and powerful traffic emulation. 

Illustration

Hawkeye

Hawkeye Active Network Monitoring Platform allows you to quickly and efficiently test network performance, actively detect and isolate problems by performing periodic inspections of any part of the network on a wireless and wired connection.

Illustration

IxChariot

Instant performance assessment of complex networks from pre- to post-deployment. Delivers full application emulation and key performance metrics, including throughput, packet loss, jitter, delay, MOS, and OTT video like Netflix, YouTube.

Illustration

CyPerf

Highly scalable traffic simulation for distributed virtual, hybrid, and physical networks. Test performance on live networks or in the lab with zero trust traffic emulation, a wide range of attack simulations, tens of millions of concurrent users, and millions of connections per second.

Illustration

BreakingPoint

All-in-one applications and network security testing platform. Simulates more than 490 real-world application protocols. Delivers all Real-World Traffic simultaneously from a single port, including legitimate traffic, DDoS, and malware. Supports more than 60,000 attacks and malware.

Illustration

IxNetwork

L2-3 network infrastructure performance testing that scales to business needs. Offers test coverage from 1G to 800G Ethernet. Generates traffic flows that mimic realistic user applications and scenarios. IxNetwork delivers end-to-end test system automation.

Illustration

IxANVL

The industry standard for automated network protocol validation – easily expands to accommodate new interface types, protocols, and/or test cases. Functions with powerful test and analysis platform via a virtual network interface card (VNIC) driver.

Illustration

IxChariot


Illustration

IxVerify


Illustration

APPLICATIONS AND SECURITY

Keysight's application-focused family of load modules delivers the industry's most scalable solution for testing converged multi-play services, application delivery, and network security platforms for both wired and wireless networks.

Illustration

NETWORK INFRASTRUCTURE

Keysight's routing, MPLS, and data center focused family of load modules delivers the industry's highest density and performance Ethernet IP test solutions with industry's first at 1G, 10G, 25G, 40G, 50G, 100G, 400G, and 800G.

Illustration

MOBILITY

Keysight’s mobility focused family of load modules helps mobile operators and equipment manufacturers test and validate complex wireless networks and WiFi components to ensure greater end-to-end service quality.

Illustration

NETWORK IMPAIRMENT EMULATORS

Network emulators precisely emulate real-world network impairment conditions. Emulate in the lab normal and worst-case conditions that occur over live production LAN/WAN networks.

Illustration

CHASSIS

Keysight chassis are flexible platforms that deliver the most comprehensive solutions for performance, functional, conformance, and security testing of network equipment and applications.

Network visibility solutions

Illustration

Vision X

Illustration

Vision ONE

Illustration

Vision Edge 100

Illustration

Vision Edge 40

Illustration

Vision Edge 1s

Illustration

Vision 7300 (NTO 7300)

Illustration

Trade Vision

Illustration

GTP Session Controller 7433 

Illustration

Vision Edge OS

Illustration

Vision 7816

Illustration

Vision T1000

Illustration


Illustration

Patch Taps

Illustration

Flex Tap - Passive Fiber Optical Taps

Illustration

Copper Taps

Illustration

iBypass 100G

Illustration

iBypass 40G

Illustration

iBypass 4 Cooper

Illustration

iBypass VHD

Network security solutions

Illustration

Threat Simulator

New platform for measurement, control
and improving the efficiency of cybersecurity of enterprises

Illustration

ThreatARMOR

Ixia's easy-to-use ThreatARMOR is designed to block unwanted inbound traffic from a large number of known IP addresses of problem sites or even entire countries and to prevent malicious network connections coming from computers.

Illustration

Breaking Point

A platform for testing network performance and security.

Illustration

BreakingPoint VE

Virtual edition of Breaking Point to validate the security posture of your networks with real applications and a complete range of threat vectors

Illustration

BreakingPoint QuickTest

Turn-Key performance and security testing to validate devices and network security with real-world applications and threat vectors

Illustration

BreakingPoint Cloud

A SaaS cybersecurity monitoring platform with distributed denial-of-service (DDoS) attack simulation

Illustration

TrafficREWIND

Translate production network traffic into real traffic stimulus for BreakingPoint tests

Illustration

CyPerf

Validate security and performance of hybrid / cloud infrastructures with industry-first cloud-native, elastic test application

Illustration

IoT Security Assessment

Comprehensive, automated security testing for IoT devices

Illustration

AppStack

Advanced intelligence and application-level visibility

Illustration

Application and Threat Intelligence Subscription

Continuous real-time data feeds to ensure current application and threat intelligence at all times

Performance monitoring solutions

Illustration

IxChariot

Instant performance assessment of complex networks from pre- to post-deployment

Illustration

Hawkeye

Hawkeye Active Network Monitoring Platform allows you to quickly and efficiently test network performance, actively detect and isolate problems by performing periodic inspections of any part of the network on a wireless and wired connection.

Illustration

IxProbe

Active SLA monitoring for the network's edge

Illustration

Vision Edge 1S

Visibility and monitoring for the edgeless enterprise

Materials

Heading photo

Why and how to simulate attacks on infrastructure?

E-BOOK

In today's environment, companies rely on a wide variety of solutions to protect their networks from cyberattacks and network peaks. But two out of three companies aren't sure their security tools are set up properly. This is why many SecOps teams rely on Breach and Attack Simulation (BAS) tools such as Threat Simulator.

In the book you will find answers to the most common questions:
•How to continuously simulate attacks on your direct network
•How to improve protection by quickly identifying and eliminating potential threats, etc.
Download and get valuable information on how to make your own information security system ready for real threats without the slightest risk!

INTERESTED IN IMPLEMENTING A PRODUCT INTO YOUR COMPANY'S INFRASTRUCTURE?

Fill out a short form, and the manager will contact you to calculate the cost of a solution specifically for your request

Thank you!

We will contact you shortly.

Can't send form.

Please try again later.

Made with