Column Control DTX

Zero Trust Validation

Flyers

Keysight’s CyPerf is the world’s first instantly scalable and elastic agent-based  test solution for zero trust in hybrid, distributed cloud networks. It recreates  every aspect of a realistic workload across a variety of physical and cloud  environments to deliver insights into end user experience, cybersecurity posture,  and performance bottlenecks of distributed networks. 

 

Test agents send application and attack traffic simultaneously through hybrid  networks, security devices and zero trust implementations to validate scalability,  performance, and security efficacy.

 

Challenges to testing Scalability and Performace of zero trust implementations

 

• Characterizing the security efficacy of zero trust strategies especially with lateral network movement and/or inside sourced attacks

• Accessing quantifiable data and key performance indicators like throughput, concurrent users, latencies, and quality of experience before and after implementing zero trust controls

• Assessing the functionality, performance, and scale of the zero trust authentication engines on a continuous basis to monitor for any undesirable deviations

• Demonstrating to customers and stakeholders the immediate value of zero trust implementations through live-traffic, and custom proof of concepts (POCs)

 

CyPerf—Your Solution to Ensuring a Scalable and Secure Zero Trust Framework

 

• Generate authenticated and unauthenticated application traffic and security attacks to validate zero trust authentication policies

• Characterize the performance, scale and responsiveness of zero trust  implementations by generating thousands of authentication requests and  concurrent sessions in a repeatable manner

• Simulate lateral movement attacks where un-authenticated attacks attempt to  propagate throughout the network

• Support is built-in for HTTP Redirect and authentication/session cookie to create  custom application flows and scenarios for unparalleled flexibility

• Support for millions of connections per second and tens of millions of  concurrent users

 

Validate Zero Trust

 

Generate authenticated and unauthenticated application traffic and security attacks to validate zero trust authentication policies. Characterize the performance, scale, and responsiveness of the zero trust implementations by generating thousands of authentication requests for up to 60 million concurrent users.

×

Please have a salesperson contact me.

*Indicates required field

Preferred method of communication? *Required Field
Preferred method of communication? Change email?
Preferred method of communication?

By clicking the button, you are providing Keysight with your personal data. See the Keysight Privacy Statement for information on how we use this data.

Thank you.

A sales representative will contact you soon.

Column Control DTX