Choose a country or area to see content specific to your location
Por Favor, Confirme
Confirme o seu país para ter acesso a informações sobre preços aplicáveis, ofertas especiais, eventos e contatos.
Produto e Serviços
- Spectrum Analyzers (Signal Analyzers)
- Network Analyzers
- Logic Analyzers
- Protocol Analyzers and Exercisers
- Bit Error Ratio Testers
- Noise Figure Analyzers and Noise Sources
- High-Speed Digitizers and Multichannel DAQ Solutions
- AC Power Analyzers
- DC Power Analyzers
- Materials Test Equipment
- Device Current Waveform Analyzers
- Parameter / Device Analyzers and Curve Tracers
- Geradores, Cargas e Fontes de Alimentação
- Instrumentos Modulares
- Segurança e Teste de Rede
- Network Visibility
- Produtos Adicionais
- Todos os produtos, softwares e serviços
O que você está procurando?
Wireless Has Become Your Primary Business Connection
More than 10 billion mobile devices have become the primary connection for business-critical apps and services. Yet few enterprises test their wireless networks and devices for connection quality and security. The more business world takes wireless performance for granted, the higher the cost of service interruption.
Continual upgrades from Long Term Evolution (LTE) cellular, 802.11a, b, ac, n, and emerging technologies like 5G, MU-MIMO, and 802.11ax require end-to-end, continuous testing. Keysight mobility tests and monitoring validate all your wireless technologies.
White Papers 2020.05.25
Authoritative Guide to Advanced LTE Testing
White Papers 2020.05.21
Wi-Fi and LTE Coexistence Validation Methods
White Papers 2020.05.27
Security and Reliability of Mobile Healthcare Devices: Best Practices
White Papers 2021.12.19
Validating VoLTE: A Definitive Guide to Successful Deployments
Solution Briefs 2020.05.26
Application Notes 2020.06.23
Long Term Evolution – Evolved Packet Core Network
5G and LTE Wireless Test Solutions
LTE Wi-Fi Load Test
Learn how Keysight proactively evaluates performance of your networks and pinpoints the weakest spots to avoid catastrophic failures.
Tapping Into Your Virtual Data
Your security is only as good as the data it sees. You rely on your network security tools to analyze and protect your data. Our visibility solutions provide access to east-west data, and distribute it to the right security and monitoring tools at the right time. We provide more than just copies of raw data to your security, analytics and performance tools in any virtual environment — we filter what is relevant to the user or tool at the source.
The combination of Keysight virtual taps and virtual packet brokers delivers the total visibility you need. The virtual visibility tools supports packet and application flow filtering, NetFlow generation with advanced application identification and geographic location, secure sockets layer (SSL) decryption, load balancing, and many advanced packet processing capabilities, like deduplication, header stripping, and fragmentation.
Stress test your mobile device’s processor, operating system, application performance, connectivity, roaming, and range. Find vulnerabilities before someone else does.
Stress test your Wi-Fi access points. Push them to the breaking point on traffic volume, throughput, connection capacity, and application performance.
“Ixia’s (now Keysight) solutions outperformed competitors to ensure the information security of our campus network and the existence of a safe and reliable computing environment for research.”
CHIEF INFORMATION SECURITY OFFICER, MAJOR NORTH AMERICAN UNIVERSITY
“Enterprise collaboration tools have become a critical part of today’s working culture, and with the rise of BYOD, a good experience on mobile devices is essential.”
TODD HAUGEN, GROUP MANAGER OF SKYPE WI-FI, MICROSOFT