Choose a country or area to see content specific to your location
Bestätigen Sie Ihr Land, damit Sie die für Sie zutreffenden Informationen über Preise, Sonderangebote, Veranstaltungen und Kontaktdaten erhalten.
PRODUKTE UND DIENSTLEISTUNGEN
- Spektrumanalysatoren (Signalanalysatoren)
- Protokoll-Analysatoren und Prüfgeräte
- Rauschzahl-Analysatoren und Rauschquellen
- High-Speed Digitizers and Multichannel Data Acquisition Solutions
- Parameter-/All-in-one-Analysatoren und Messkurvenschreiber
- Generatoren, Rauschquellen und Stromversorgungen
- Mobilfunk und andere Wireless-Technologien
- Modulare Messgeräte
- Netzwerktest und -sicherheit
- Additional Products
- All Products, Software, Services
Können wir Ihnen behilflich sein?
- Easy-to-use web interface with point-and-click functionality
- Built-in NetStack, PacketStack, AppStack, SecureStack, MobileStack features
- Highly resilient, active-active inline and out-of-band capabilities
- Max 64 10G ports / Max 4 40G ports
- Simultaneous inline and out-of-band monitoring capabilities
- Supports Keysight’s Ixia Fabric Controller (IFC)
- 1 RU
New: Voice Over IP Monitoring on Vision One
As the demand for data, speed, quality, and voice services skyrockets, so does the demand put on your monitoring probes. Keysight's Voice Over IP (VoIP) monitoring, a part of MobileStack, on your Vision ONE system helps restore visibility into the traffic on your network while alleviating the stress on your probes. VoIP monitors both caller and callee phone numbers while whitelisting VIP customers and scaling with increasing traffic so that your probes receive the data they need at a capacity they can manage.
Find out more on the MobileStack page.
A Single Platform for a Granular View of Network Security and Troubleshooting
Problem: The Fight Against Invisible Threats
What network managers cannot see, they cannot fight. Threats carefully hidden in encrypted traffic can easily bypass security controls and the watchful eye of IT teams. Application bandwidth explosions with the sudden and rapid expansion of a new or unknown application can go undetected until they threaten the availability and health of the network. There are ways to amplify these issues, but they often require a complicated mix of tools to gain complete visibility into all the traffic and applications on a network. And managing a myriad of security and performance monitoring solutions can compromise network performance.
Solution: Visibility Intelligence Strengthens Network Security and Optimizes Performance
Keysight Vision ONE™ is a turnkey device that enables organizations to maintain security as well as identify and resolve performance problems across physical and virtual infrastructures from a single platform. Whether fighting against threats hidden in encrypted traffic, or feeding the right data to the right forensic solution, Vision ONE boosts network protection without negatively impacting performance. Build a layered defense with a combination of best-of-breed inline security and out-of-band analysis tools, or create a strong foundation that helps you understand what is happening in an enterprise network. Either way, Vision ONE is a crucial step toward complete network security.
Aided by integrated AppStack capabilities, Keysight's Vision ONE network packet broker (NPB) enables you to filter and visualize not only Level 2–4 traffic, but also Layer 7 application traffic, so that suspicious applications can be tagged and watched. This provides security advantages as users can quickly spot rogue applications or unusual activity, including traffic or packets coming or going from unauthorized geographies, or questionable file transfer protocol (FTP) transfers conducted on sensitive data in the middle of the night.
This capability alone would have short-circuited some of the most notorious data breaches suffered by enterprises and agencies in the past three years.
The integrated AppStack capabilities also offers performance advantages as customers can view real-time application level traffic and metadata through a web application program interface (API), or it can be filtered, decrypted, and sent onto forensic or application monitors for further inspection.
Vision ONE is the most critical piece of network infrastructure you never realized you needed.
Stack up Keysight’s leading visibility intelligence features to optimize your traffic analysis and security tool performance. Used with a network packet broker, virtual or cloud platform, the extensive set of intelligent features allows you to modify, mold and transport traffic specific to tool needs. Moreover, we provide industry-specific, specialized capabilities. Each feature is executed with a purpose-built design to ensure you get the best performance whether in a physical data-center or in the cloud. To learn more, click on each stack.
Security threats are increasing in volume and potency. Network and security administrators need help inspecting traffic, identifying threats and optimizing infrastructure performance. Vision ONE and ControlTower integrated with Cisco’s popular Nexus 3000 switches provides an additional layer of protection that enables partners of Ixia (now part of Keysight) and Cisco to close the security and performance gap without adding additional overhead to infrastructure and management. By deploying Vision ONE and ControlTower alongside Cisco’s Nexus 3000, Ixia (now Keysight) partners will deliver greater economies of scale by managing and optimizing traffic flows.
LAWRENCE M. WALSH, CHIEF ANALYST, THE 2112 GROUP
Product Tour 2017-08-29
Network Visibility - Resilience Matters
Product Tour 2017-08-29
Network Visibility - Performance Matters
White Papers 2022.01.25
Deploying an Inline Security Architecture: Key Considerations
What Is a Network Packet Broker (And Why Do You Need One)?
Solution Briefs 2022.09.15
Network Visibility Network Packet Broker Comparison Table
Solution Briefs 2022.01.21
How to Get Ready for TLS 1.3: Keysight’s 10-Point Checklist
Solution Briefs 2022.01.04
Vision ONE: The All-in-One Visibility Platform
Data Sheets 2021.07.22
Vision ONE Security Without Sacrifice