O que você está procurando?
Eliminate blindspots that impact your organization's security and performance
Keysight dynamic network intelligence lets you take traffic from anywhere on the network, filter, groom and process it and send that traffic to the network security and monitoring tools that need it—decrypted, deduplicated, unencapsulated and ready for efficient consumption without blind spots or dropped packets.
Enterprises, government agencies, educational institutions, and service providers all need total visibility, without blind spots, to effectively manage:
- Network Security, both inline and out-of-band
- Network and Application Performance Monitoring
Dynamic network intelligence is enabled by hardware acceleration, line rate processing, and a extremely easy-to-use management interface to deliver value in four important areas.
Industry Leading Visibility With Vision One
Deploying Dynamic Network Intelligence
Dynamic network intelligence solves challenges in Network Security (both inline and out-of-band) and Performance Monitoring. Learn more about these deployment options.
Visibility powered by an intelligent security fabric improves the accuracy of out-of-band network, application, and security monitoring, including NPM, APM, SIEM, IDS, etc.
Failsafe visibility to physical, virtual, and encrypted traffic maximizes the value of your firewall, intrusion prevention system, malware protection, and other security appliances.
Better Security From Dynamic Network Intelligence
Data Access Anywhere
You want access to data everywhere it exists in your network, not just where a network switch is located. With a combination of fiber, copper, and virtual taps, Security Fabric provides you with 100% access to physical, virtual, public and private cloud traffic with higher reliability than using only SPAN ports. And even during high-volume traffic conditions, Keysight gives your security and monitoring tools total visibility to network traffic, with zero packet loss.
Learn more about Network Access.
You need failsafe security solutions to maximize your defenses and protect network availability. Whether you experience a hardware or software failure, or just need to take a tool offline for maintenance, Keysight bypass switches can route traffic around any security tool that is unavailable or route traffic to an alternate device. With the industry's fastest near-instant recovery, Keysight Security Fabric ensures your security solutions operate continuously.
Learn more about Inline Security Resilence
Context-Aware Data Processing
Keysight Security Fabric uses a powerful, hardware-based processing engine to send the right data to the right tools, at line rate speed. NetStack and PacketStack functionality enable the engine to isolate and filter traffic based on metadata; generate NetFlow data; and provide deduplication, packet trimming, and data masking. AppStack functionality supports filtering based on application, geolocation, browser, device, or any other user-defined parameter.
Learn more about Context-Aware Data Processing.
Security Intelligence Processing
Keysight Security Fabric helps keep your defenses strong with unique security features. SecureStack functionality provides passive SSL decryption to offload your security tools and help them work more efficiently. PacketStack functionality supports compliance by masking sensitive information like credit card and social security numbers. In addition, Keysight offers a hardware-based threat intelligence solution that blocks traffic from IP addresses associated with malware, viruses, and other attacks, so it never even enters your network.
Learn more about Threat Intelligence.
“We were trying to stay ahead of steadily increasing traffic volumes, coupled with the growing need for robust digital security and network visibility.”
Cam Beasley, Chief Information Security Officer, University of Texas
"The Ixia (now part of Keysight) solution has cut the time it takes to diagnose performance problems from days to hours."
Ross Jones, Network Manager at Cook Children's Health
"We were able to start using the Ixia (now part of Keysight) NTO series right away, without any special training. It’s extremely easy to use."
Ryutato Inoue, Manager, Network Security at Yahoo Japan Corporation
Extra Help With Visibility
We all need a little extra help sometimes. Fortunately, Keysight has a number of different professional services offerings to help you get the most out of your network visibility investments.
We can help you:
- Accelerate deployments
- Remove risk from projects
- Train your teams
- And much more!
Learn more about Keysight Professional Services.
Find out more about the products and feature sets that form Keysight's visibility solution.