Here’s the page we think you wanted. See search results instead:

 

Contact an Expert

Passive Network Monitoring System

The growth in both wireless and wireline telecommunication is led by the demand for 3G and 4G broadband services. Wireless broadband is growing at an unprecedented rate and network providers are having to race through technologies and infrastructure changes to accommodate this at an alarming rate. This in turn makes the jobs of those engaged in public safety and e911/e112, critical infrastructure protection, network optimization and analytics, situational awareness and those with a lawful requirement to monitor communications increasingly more complex. Keysight Technologies offers a highly scalable, consolidated mobile network monitoring and processing portfolio that effectively processes both voice and data across 2G, 2.5G, 3G and 4G technologies and enables operators to untangle concatenated transport layers and wrappers to get to relevant data. These systems allow authorized users to identify and extract voice based communications of interest, provide accurate location information, correlate voice and data selectors and provide advanced filtering and selection for multiple 10G LTE data and legacy (2G,3G) communications links. These systems additionally offer a consolidated User Interface that not only allows unified tasking, but unified tracking and related sector identification across multiple systems and technologies.

  • J7523A Cellular Network Passive Probe J7523A Cellular Network Passive Probe 

    J7523A Cellular Network Passive Probe

    A popular choice within the Lawful Intercept community, the Keysight J7523A Cellular Passive Probe provides data acquisition, correlation and augmentation for 2G, 2.5G, 3G and 4G networks, based upon a high availability 2U industry standard platform.

  • J7824A Content Intercept Manager J7824A Content Intercept Manager 

    J7824A Content Intercept Manager

    • Collect warranted communications in real time
    • Prioritize real time calls or analyze forensically offline
    • Rapid deployment for tactical interception