Choose a country or area to see content specific to your location
Por Favor, Confirme
Confirme o seu país para ter acesso a informações sobre preços aplicáveis, ofertas especiais, eventos e contatos.
Produto e Serviços
- Spectrum Analyzers (Signal Analyzers)
- Network Analyzers
- Logic Analyzers
- Protocol Analyzers and Exercisers
- Bit Error Ratio Testers
- Noise Figure Analyzers and Noise Sources
- High-Speed Digitizers and Multichannel DAQ Solutions
- AC Power Analyzers
- DC Power Analyzers
- Materials Test Equipment
- Device Current Waveform Analyzers
- Parameter / Device Analyzers and Curve Tracers
- Geradores, Cargas e Fontes de Alimentação
- Instrumentos Modulares
- Segurança e Teste de Rede
- Network Visibility
- Produtos Adicionais
- Todos os produtos, softwares e serviços
O que você está procurando?
Keysight Threat Simulator for Healthcare Providers
The Cyber Trust Mark is redefining security and privacy for IoT. But what does it mean for manufacturers? Join us on January 24 to find out and hear from experts at Keysight, Yale Locks, and Google. Read our blog and the press release to learn more about the program launch at the White House as Keysight joined a select group of industry leaders.
Read our guide written by security and networking experts who understand the Healthcare industry.
See a demo of an attack on an IoT medical device and how we can help you secure your medical devices; the demo shows the IoT Security Assessment tool simulating a potential attack on a pulse monitor.
Apply for our Managed Security Services Provider (MSSP) partner program today, by joining our MSSP partner program. Help your customers transform while identifying growth opportunities for you as the MSSP. Grow services beyond the traditional network perimeter. We can help you provide advanced security posture services and consultancy across the extended organization.
Keysight are delighted to join the foundation and we hope you can join us at the upcoming IoT security foundation conference in November, where our very own Scott Register (VP of Security) will talk about how to protect IoT devices from cyber threats and meet new IoT compliance standards.
Automated IoT Testing
Automated IoT Security Testing
- Latest threats and recent scenarios
- Press a button and run automated tests
- See the results and re-run the ones that fail
Automated IoT Compliance Testing
- What severity are your vulnerabilities?
- Pass Or Fail ?
- Certification for secure devices
Automated IoT Security Testing
- Quickly find security flaws with intuitive UI
- Integrate security testing into CI/CD pipeline with complete REST API management
- Discover unknown network stack and chipset weaknesses with protocol fuzzing
- Harden security with vulnerability assessment
- Validate Wi-Fi, cellular, Ethernet, CAN bus, Bluetooth, and BLE connected devices
Trusted Across Multiple Industries
'The internet of things is enormous and getting cybersecurity at scale will be crucial. Automated cybersecurity validation for consumer IoT has huge potential for companies to make their compliance uniform and repeatable."
Michael Bergman, Vice President, Technology and Standards, Consumer Technology Association.'
As IoMT’s role in healthcare grows, cybersecurity threats become all the more salient. When the stakes are this high, you can't leave anything to chance. That's why manufacturers and healthcare providers alike trust Keysight to make sure their devices can be trusted when it matters most.
In today’s vehicles, faster and better connectivity enables a host of new possibilities. Turning these ideas into reality depends on a host of connected components and millions of lines of software code. Proactive prevention starts with cybersecurity. With Keysight, you can find and fix potential weak spots before they can be exploited by hackers.
Operational technology (OT) and SCADA systems pose significant cybersecurity risks. Largely built on legacy technologies, these devices are easy targets for attackers, because they often haven't been tested against common exploits. Don't wait for attackers to find their way in. With the IoT Security Assessment, you can take matters into your own hands and harden critical devices against a full array of popular and emerging TTPs.
Cybersecurity is no longer just about protecting equipment and borders. Attackers aren't just looking at networks and data centers, they're taking aim at security gaps in aircraft, sensors, drones, and satellites. Assessing your security readiness has never been more important. That's why governments and contractors alike trust Keysight to fortify connected components, devices, and full-scale assemblies.
Solution Briefs 2023.10.17
Keysight IoT Security Assessment
Data Sheets 2023.11.07
IoT Security Assessment
White Papers 2022.07.29
Application and Threat Intelligence Research Center
Product Tours 2021.11.15
IoT Security Assessment Introduction