Here’s the page we think you wanted. See search results instead:

 

Contact an Expert

Technical Support

Electronic Measurement

Support by Product Model Number:

Refine the List

remove all refinements

By Industry/Technology

By Type of Content

By Product Category

26-50 of 461

Sort:
Darktrace + Keysight: Securing the Industrial Internet of Things (IIoT)
Darktrace and Keysight deliver an integrated solution for complete, real-time visibility to defend hybrid IT and operation technology (OT) infrastructures. Download this joint solution brief to learn how to improve security in oil, gas, utilities, manufacturing, smart cities and maritime industries, alert IT to anomalies indicative of malware, ransomware, and zero-day attacks and efficiently access IT, OT, and IoT data.

Solution Brief 2020-06-18

PDF PDF
Regenerative Power Supply Addresses Efficiency, Safety, and Operation Costs
High power batteries and bi-directional electronics pose several test challenges. Learn how to overcome these challenges with a regenerative power supply. The architecture of a regenerative power supply helps explain how it can safely return energy to the grid.

Solution Brief 2020-06-18

PDF PDF
IxProbe + Hawkeye: Helping Service Providers Take Control of Last-Mile Delivery
Connectivity is the heartbeat of business, and service providers supply the pulse. Retailers and other multi-site organizations depend on service level agreements (SLAs) to keep their businesses running safely and smoothly, they count on you to fulfill them with minimal disruption and latency. But what if you cannot monitor and verify the speeds you have promised? When you partner with peers to supply last-mile connectivity, you lose visibility and control. Read this solution brief to discover how to take control of last-mile blind spots with IxProbe and Hawkeye, enabling you to actively monitor and verify SLAs, offer lucrative service assurance to clients and improve operational efficiency with a unified monitoring architecture.

Solution Brief 2020-06-17

PDF PDF
Hawkeye – Wi-Fi Monitoring
Hawkeye is an active network monitoring solution that can be deployed across entire company locations and campuses, acting as the eyes and hands of the IT and network operations teams to monitor Wi-Fi connectivity, coverage, and end-user services over Wi-Fi networks.

Solution Brief 2020-06-17

PDF PDF
ARESONE and K400 400/200/100/50GE Cable Guide
Open the document referenced here to understand the speeds, interfaces, and point-to-point and fan-out cable combinations supported by AresONE and K400 QSFP-DD 400GE test hardware.

Solution Brief 2020-06-16

PDF PDF
100/50/40/25GE Hybrid Network Emulator Solution
Today’s 100/50/40/25GE devices and networks require in-depth testing that includes substantial packet delay and all the traditional network impairments. However, test solutions with this functionality have been unavailable in the market—until now. Open the document referenced here to understand how Ixia's 100/50/40/25GE Hybrid Network Emulator Solution can solve your network impairment test challenges.

Solution Brief 2020-06-16

PDF PDF
PROPSIM FS16 5G Channel Emulation Solution - Solution Brief
5G user experience depends on device performance in harsh mobile environments. Keysight’s channel emulators enable you to validate device and base station end-to-end real-world performance in the lab.

Solution Brief 2020-06-15

PDF PDF 10.10 MB
PROPSIM FS16 5G Channel Emulation Solution
5G user experience depends on device performance in harsh mobile environments. Keysight’s channel emulators enable you to validate device and base station end-to-end real-world performance in the lab.

Solution Brief 2020-06-15

PDF PDF
Buying Guide — Which iBypass Belongs in your Network?
Ixia Bypass Switches are inline devices that provide fail-safe protection for inline security and monitoring devices. Here is a guide to help you choose the right iBypass switch for your particular deployment.

Solution Brief 2020-06-15

PDF PDF
Application Identification and Filtering in AppStack
A list of released application identification and filtering signatures for AppStack. Includes Amazon S3, Box, Facebook, GitHub, Instragram, IMAP, Netflix and many more.

Solution Brief 2020-06-15

PDF PDF
Product Environmental and Regulatory Compliance
This website gives access to public Keysight information related to product regulatory affairs.

Solution Brief 2020-06-10

Monitor Cisco ACI Infrastructure Solutions with Ease
Cisco has created a software defined networking (SDN) solution called Application Centric Infrastructure (ACI). To optimize this solution for monitoring purposes, a Visibility Architecture consisting of taps and network packet brokers (NPBs) is needed. The Visibility Architecture is used to overcome the inherent limitations of an ACI architecture and maximize the use of your Cisco equipment. Read this document to learn how to: First, improve ACI deployments with packet filtering, header striping, and packet slicing. Second, reduce monitoring data bandwidth by applying de-duplication. Third, eliminate encapsulation issues by using an NPB to strip off VXLAN headers.

Solution Brief 2020-06-02

PDF PDF
Reduce NetFlow Programming Costs and Complexity
While NetFlow technology has been available for years, many enterprises are reluctant to fully deploy it. This is for good reason. Turning on the NetFlow feature can increase the CPU load by 10% or more. In addition, NetFlow is typically programmed manually using a command line interface (CLI). NetFlow also has to be enabled across all of the network switches to get the full benefit. Therefore, performance degradation and network outage risk associated with this technology has been a barrier to deployment. This is unfortunate, as NetFlow provides summarized network data that provides many benefits like the following: First, the ability to see network bottlenecks. Second, observe denial of service (DOS) attacks. Third, determine where to deploy quality of service (QOS) improvements. Fourth, manage resource utilization of network components. Read this solution brief to see how Ixia can solve NetFlow deployment problems so that you can quickly and easily harness the power of the NetFlow feature. In addition to offloading (removing) the CPU load issue as well as the programming issue (as Ixia uses an intuitive GUI interface), Ixia also offers extensive additional capabilities to basic NetFlow features. This includes geolocation, browser type, device type, and other information. See how you can take advantage of these features to optimize your network management.

Solution Brief 2020-06-02

PDF PDF
Vision ONE: The All-in-One Visibility Platform
Your tools are only as good as the data they receive. To reduce vulnerability, minimize risks, and enhance performance, you need a network packet broker to ensure every analysis tool gets exactly the data required. Network packet brokers organize and streamline data so that security threats are detected early and issue resolution times are minimized. Read the product brief to find out how Vision ONE brings complete visibility to your network.

Solution Brief 2020-06-02

PDF PDF
Forescout and Ixia: Securing the Internet of Things (IoT) the Moment Devices Connect
The Internet of Things (IoT) has ushered in a relentless flurry of devices connecting to public and private networks: Patient monitors in healthcare facilities. Connected cars in major cities. Tablets, smartphones, and laptops as patrons visit office buildings, hospitals, airports, coffee shops, and a host of other business locations.

Solution Brief 2020-06-01

PDF PDF
Security Monitoring of Critical Infrastructure
Security breaches continue to remain a persistent challenge for both data center providers and enterprises monitoring their networks, even as the expenditures on network security appliances increases. When it comes to industrial control systems (ICS), there are many systems that are vulnerable. Here are some examples of vulnerable systems: Heating, ventilation and air conditioning (HVAC); Building power distribution systems; Communication systems. Read this brief to see how you can improve ICS security and monitoring with cost-effective network visibility.

Solution Brief 2020-06-01

PDF PDF
Reduce Bandwidth Overload with a Data Abstraction Layer
According to Cisco Systems, network traffic will reach 4.8 zettabytes (that is 4.8 billion terabytes) by 2022. Businesses cannot continue as usual and keep up with network performance, security threats, and business decisions. This is especially true as data networks expand from the network core to the very edges of the network. A layer of abstraction between data access and analytic tools to drive rapid business decisions can help solve the problem. This abstraction layer provides the flexibility to meet the ever-evolving needs of the data center while segmenting and consolidating the data as necessary. See how this can be effectively accomplished with minimal investment by reading this solution brief.

Solution Brief 2020-05-31

PDF PDF
Validating SmartNIC
Those familiar with the SmartNIC industry may note that this is a resurgence of SmartNICs after they failed to pick up last time around. This time though, they have a strong catalyst in the cloud, hyperconverged data centers, big data, and more. But what is the best use of SmartNIC technology in your network? Is your implementation as high-performing as it should be? How will its use impact other applications? Are you opening a security loophole that exposes new vulnerabilities? Testing with real-world application traffic and malicious threat vectors will provide the answers to these questions and many more. Testing is imperative to ensure SmartNICs live up to expectations this second time around. This document looks at a few areas where testing is critical to successful deployment.

Solution Brief 2020-05-31

PDF PDF
Ixia Cyber Range Services
Too many organizations and government agencies have answered the cyber defense challenge by arming their networks with firewalls, intrusion prevention systems (IPSs), and other defenses. Though this satisfies a rudimentary network security checklist, this approach has no hope of keeping pace with the rapid evolution and scale of cyber threats, and is destined to fail. Effective cyber security is the product of melding trained people, or cyber warriors, and automated systems into a unified defense.

Solution Brief 2020-05-31

PDF PDF
Validating Data Center Microsegmentation
Virtualization took marketing’s microsegmentation concept and applied it to modern data centers, using a collection of virtual machines or containers to segment data centers by their meaningful workloads. With workloads classified by the specific functions they serve (like web, application, database, services workloads), organizations can specify security measures relevant to each workload type. But data center operators are finding that testing the security and performance of these specialized workloads is difficult. This document will help you understand the challenges of testing data center segmentation and how Ixia's BreakingPoint Virtual Edition (VE) can help.

Solution Brief 2020-05-31

PDF PDF
Hawkeye: Ensure Your Network is Ready for Microsoft Teams and Skype for Business
Microsoft Teams and Skype for Business have become standards for business communications. However, an influx of critical traffic generates additional load on your network, creating challenges when devices and transport pipes are necessary to transport real-time voice and video conversations.

Solution Brief 2020-05-31

PDF PDF
Validating SCADA Network Security
With SCADA operating over IP networks, the line between IT and OT has blurred... However, many OT teams are not prepared to handle threats in ICS networks. This document will help you understand the challenges of testing SCADA networks and how Ixia's BreakingPoint can help.

Solution Brief 2020-05-31

PDF PDF
Voice Service Assurance
To mitigate latency and jitter, service providers need the ability to measure how real-world call-flow characteristics of ever-changing traffic patterns impact voice services. But validating user experience in a large distributed network is challenging, as the network is complex and many times there is no possible way to place a test probe on the end user equipment. Open this document to learn how Ixia IxLoad test endpoints, deployed in the public cloud, enable automated assessments from a simple user interface (UI), giving operation managers instant insight into actionable information about the quality of their voice services.

Solution Brief 2020-05-30

PDF PDF
Get Visibility into Your Clouds
To maintain security and optimize performance in the cloud, your monitoring systems need access to all of your cloud-based data traffic. What you need is a reliable and scalable way to get visibility to cloud-based traffic, pinpoint data that is relevant, and deliver it quickly to your monitoring systems, no matter where they are located. Ixia's cloud visibility platform offers key advantages that other solutions do not.

Solution Brief 2020-05-30

PDF PDF
Hawkeye — Continuous Proactive Bandwidth Monitoring
Every day, employees use resources located at various cloud providers and on-premise data centers — using the same access link. However, this makes maintaining a consistent, high-quality user experience increasingly difficult. With Keysight Hawkeye, network infrastructure teams can finally take back control of user experience. Discover how to measure active bandwidth around the clock, enabling you to track the peaks and troughs of bandwidth availability — and be the first to know if services are not getting enough bandwidth.

Solution Brief 2020-05-29

PDF PDF

Previous 1 2 3 4 5 6 7 8 9 10 ... Next