Choose a country or area to see content specific to your location
Confirm your country to access relevant pricing, special offers, events, and contact information.
PRODUCTS AND SERVICES
- Spectrum Analyzers (Signal Analyzers)
- Network Analyzers
- Logic Analyzers
- Protocol Analyzers and Exercisers
- Bit Error Ratio Testers
- Noise Figure Analyzers and Noise Sources
- High-Speed Digitizers and Multichannel DAQ Solutions
- AC Power Analyzers
- DC Power Analyzers
- Materials Test Equipment
- Device Current Waveform Analyzers
- Parameter / Device Analyzers and Curve Tracers
- Generators, Sources, and Power Supplies
- Modular Instruments
- Network Test and Security
- Network Visibility
- Additional Products
- All Products, Software, Services
See How We Stack Up!
Keysight offers an extensive set of visibility intelligence feature stacks so you can get the most out of your visibility and security platform – our capabilities allow filtering based on L2 through L7. Moreover, we provide industry-specific, specialized capabilities. Each stack of features is executed with a purpose-built design to ensure you get the best performance whether in a physical data-center or a private, hybrid or public cloud.
Find Your Platform
Decryption and Encryption with Ephemeral Key and TLS 1.3 Support
Encrypted traffic is a dual-edged sword, where the protection it provides can be manipulated by hackers to inject malware and other threats into a network. As most traffic becomes encrypted and with ephemeral key on its way to becoming the dominant technology, organizations need a way to retain the benefits of TLS 1.3 standards, while being able to inspect traffic for threats and malware to protect their networks and users.
Keysight's Inline Decryption capability enables organizations to see inside traffic that uses ephemeral key cryptography through its visibility platform. With our Inline Decryption you can:
- Decrypt once and scale monitoring infrastructure. Offloading TLS decryption will optimize security and monitoring tool performance.
- Deploy inline, out-of-band (OOB), and simultaneous inline and OOB tool configurations for the ultimate flexibility
- See into both outbound and inbound traffic to inspect downloads and detect server attacks
- Achieve limitless visibility when used with our NetStack, PacketStack and AppStack capabilities
Inline Decryption is available via separate high-performance application modules that are compatible with Vision ONE™ and Vision X™.
- Inline Decryption employs a dedicated cryptographic processor, to provide the best throughput integrated with a visibility solution
- Throughput options on the Vision ONE include 1G, 2G, 4G or 10G (license per module). Upgrades via licensing.
- Throughput options on the Vision X include up to 25G decryption per CPU on the Application Module.
- Includes built-in policy management, URL categorization, and real-time insight through reporting
- Supports all leading ciphers including TLS 1.3 (current draft)
Learn more about our Inline Decryption capability and the Vision ONE and Vision X platforms:
Data encryption helps make information secure, but unfortunately, it can also be used by hackers to inject malware, viruses and other risky content into encrypted traffic and traverse your network without being detected. Get greater visibility by decrypting traffic to detect such malware, prevent data loss, monitor applications and more. We can help you offload the SSL/TLS decryption work and remove your network performance bottleneck.
- Get visibility to encrypted sessions without compromising security with role-based access controls and bidirectional decryption capability
- Handle 10 million concurrent sessions with up to 8Gbps throughput within AppStack on the Vision ONE and Vision 7300.
- Support encryption ciphers and key sizes: 3DES, RC4, AES, SHA1/521/384/256/224, MD5, ECC (Elliptic Curve), RSA and Diffie-Hellman Key Exchange
- No impact on application identification and filtering performance
- Can work simultaneously with NetFlow generation, data masking, PCAP, and application forwarding
Data Masking +
With personally identifiable information traversing the network, security is key to keeping your consumers and your organization safe. Data masking + helps you meet compliance regulations by securely masking sensitive data on your network such as credit card and social security numbers.
Data masking + allows you to:
- Use pre-defined patterns to mask major credit cards, social security numbers, and email addresses
- Use a configurable offset with any number of bytes to mask a specific place in a packet
- Reduce false positives with built-in credit card number validation using the Luhn algorithm
- Achieve Payment Card Industry Data Security Standard (PCE-DSS), HIPAA, and other regulatory compliance
Be More Secure
Security focused intelligence that gives you better visibility to Transport Layer Security (TLS) / Secure Sockets Layer (SSL) encrypted traffic with the greatest keys and ciphers supported.
Data Sheets 2022.04.13
Data Sheets 2021.07.22
Vision ONE Security Without Sacrifice
Data Sheets 2022.06.30
Vision X Network Packet Broker
White Papers 2021.12.20
Best Practices For Monitoring Encrypted Data