Choose a country or area to see content specific to your location
Por Favor, Confirme
Confirme o seu país para ter acesso a informações sobre preços aplicáveis, ofertas especiais, eventos e contatos.
Produtos + Serviços
Osciloscópios + Analisadores
- Analisadores de espectro (Analisadores de sinais)
- Analisadores de Rede
- Analisador Lógico
- Protocol Analyzers and Exercisers
- Testadores de taxa de erro de bit (BERT)
- Analisadores de Figura de Ruído e Fontes de Ruído
- High-Speed Digitizers and Multichannel Data Acquisition Solutions
- Analisadores de Potência AC
- Analisadores de potência CC
- Materials Test Equipment
- Device Current Waveform Analyzers
- Analisadores de Parâmetros e Dispositivos, Traçadores de Curvas
- Geradores, Fontes + Potência
- Instrumentos Modulares
- Teste de rede
- Segurança da Rede + Visibilidade
- Produtos Adicionais
- Todos os produtos, softwares e serviços
- Osciloscópios + Analisadores
O que você está procurando?
Improve Your Cyber Resilience with Simulated Attacks
Make sure your security team is always primed for the next cyberattack. The best protection — whether you’re in government and defense, banking and finance, or enterprise — is a team trained to achieve zero incidents, zero data loss, and zero-dollar loss. Dynamic, hands-on practice keeps security pros ready to respond no matter what cyber criminals throw at them.
Fight Cyberattacks in a Real-Life Setting
Rich scenarios library: With practice using a variety of simulated threat scenarios, your security team gains hands-on cybersecurity skills. We can also help you build customized cyber exercises using products in your network, so you can test your team under the actual conditions they’ll face.
Simulations of common and unusual attacks: Our cyber range attacks simulate a network security breach exactly. This gives you a true test of how your security staff will respond as individuals, and as a team in the case of a live attack.
Real-world traffic generator: The BreakingPoint traffic generator, a component of Keysight cyber range solution, simulates more than 490 real-world application protocols and supports more than 60,000 attacks and malware. Your security pros will experience unfamiliar and hard-to-identify, realistic and random traffic—just like they would on the front lines, in a live cyber attack.
No end to the threats — or for training: Your team needs continuous training to keep their skills sharp, teams collaborating effectively, and your organization protected.
Gain Confidence Knowing You’re Ready for Attackers
Skills that keep up with growing threats: On the Keysight cyber range, your security pros gain proficiency by fighting cyber attackers and learning to outsmart them. CISOs and security managers get a close look at the strengths and weaknesses of each individual and the team as a whole.
Highly coordinated incident response: Security is often siloed — but in a cyberattack, your security pros must act together. The Keysight cyber range helps them learn to work as a highly skilled incident response team.
Training as dynamic as live cyberattacks: In the Keysight cyber range, training is real enough to make user’s pulse race. Instead of static classroom learning, your team gets dynamic, hands-on training that tests their tenacity.
Keysight cyber range is a testbed for technologies: The cyber range provides the ideal environment for “situational operations” testing for new products, software releases, protocols, and organizational restructuring.
Tailor Training to Fit Your Team’s and Network Needs
Software security staff handles different roles and requires distinct skillsets. Users can train on multiple technologies simultaneously that otherwise couldn’t be covered easily by the same person or with classroom training.
The Keysight cyber range solution is based on Keysight technology and leading open-source industry products. Unlike other solutions, you can choose to integrate tools from preferred vendors into Keysight cyber range and training modules.
Move beyond off-the-shelf threat scenarios to Keysight’s cyber range exercises to test your team using attacks your organization will potentially see. Users gain the skills and applications experience your organization needs most.
Take an In-Depth Look at the Keysight Cyber Range
The solution brief explains how Keysight’s cyber range improves user’s skills to enforce cyber resilience through simulation training and exercises. Learn about Keysight cyber range’s key differentiators, including the BreakingPoint real-world traffic generator, customizable and scalable Cyber Security Operations Platform, and tailor-made environments and exercises.
Solution Briefs 2022.09.01
Keysight Cyber Range Solution