Choose a country or area to see content specific to your location
What are you looking for?
WirelessPro empowers you to model, simulate, and analyze various aspects of 5G networks, 5G Advanced technologies, and future 6G wireless channels with unparalleled ease and accuracy.
Get faster, clearer insights with our new multicore, 12-bit oscilloscope up to 33 GHz.
Emulate every part of your data center infrastructure. Emulate Anything. Optimize Everything.
Accelerate signal analysis testing with Keysight’s VSA software. Visualize, demodulate, and troubleshoot with over 75+ signal standards with precision.
With extra memory and storage, these enhanced NPBs run Keysight's AI security and performance monitoring software and AI stack.
Achieve fast, accurate board-level testing with robust inline and offline ICT designed for modern manufacturing.
Explore curated support plans, prioritized to keep you innovating at speed.
Pinpoint interference with post-processing spectrum management software in the lab.
Our high-density ATE power supplies end trade-offs between test throughput and precision.
Explore engineer-authored content and a vast knowledge base with thousands of learning opportunities.
Keysight Learn offers immersive content on topics of interest, including solutions, blogs, events, and more.
Quick access to support related self-help tasks.
Additional content to support your product needs.
Explore services to accelerate every step of your innovation journey.
Keysight BreakingPoint VE software brings proven security capabilities to virtualized and cloud-native test environments. It enables comprehensive security validation for virtual firewalls, cloud-based security controls, and software-defined networks. Integrated into CI/CD pipelines, BreakingPoint VE provides automated, realistic attack emulation to ensure code and configurations are secure before deployment. Request a quote for one of our popular configurations today. Need help selecting? Check out the resources below.
Launch as a virtual machine across public, private, and hybrid cloud platforms for flexible, on-demand testing.
Seamlessly integrate security testing into DevOps pipelines to validate virtual firewalls, SD-WAN, and VNFs during development.
Scale attack traffic generation across multiple test nodes to simulate real-world volume and behavior.
Threat and application library for consistent validation across physical and virtual environments.
939-9619
The Keysight BreakingPoint virtual edition (VE) 10G includes a floating worldwide perpetual license.
939-9640
The Keysight BreakingPoint virtual edition (VE) 100G includes a 12-month floating worldwide license and a Keysight software support subscription.
939-9600
The Keysight BreakingPoint virtual edition (VE) 1GE includes a 12-month floating worldwide license and a Keysight software support subscription.
Innovate at speed with curated support plans and prioritized response and turn-around times.
Get predictable, lease-based subscriptions and full lifecycle management solutions—so you reach your business goals faster.
Experience elevated service as a KeysightCare subscriber to get committed technical response and more.
Ensure your test system performs to specification and meets local and global standards.
Make measurements quickly with in-house, instructor-led training, and eLearning.
Download Keysight software or update your software to the newest version.
Virtualized security test platforms provide unique advantages over hardware appliances, especially in environments that are increasingly cloud-centric and software-defined. While physical test hardware is effective for dedicated on-premises labs, it is often expensive, less flexible, and constrained by physical deployment. Virtual solutions, on the other hand, can be deployed rapidly in virtual machines or cloud instances, enabling organizations to test at the same scale and complexity without requiring specialized hardware. They are particularly well-suited for organizations adopting cloud-first strategies, hybrid infrastructures, or continuous integration and continuous delivery pipelines, where tests need to be spun up and torn down on demand. This elasticity helps reduce costs, align with DevOps workflows, and ensure that security validation is embedded seamlessly into agile development processes.
A virtual attack emulation platform enables testing across the full spectrum of network and application security controls. This includes traditional perimeter defenses such as firewalls and intrusion prevention systems, as well as newer cloud-native technologies like secure access service edge (SASE), zero trust network access (ZTNA), and virtualized network functions. Beyond security appliances, these platforms can test endpoint protection tools, content filters, application-layer defenses, and even emerging cloud security services offered by major providers. Because the solution operates in software, it integrates easily into distributed environments, making it possible to test both legacy systems in data centers and modern workloads deployed in public or private clouds. In essence, it ensures that every layer of security, from the edge to the core to the cloud, can be validated under realistic conditions.
Realism is achieved by emulating both benign and malicious traffic patterns at scale. On the application side, platforms can replicate how real users interact with services such as web browsing, email, video streaming, and file sharing, often across encrypted connections. On the threat side, they generate attack campaigns that mirror tactics used by adversaries in the wild, including malware payloads, denial-of-service floods, and protocol exploits. This dual focus creates a testing environment that challenges security controls to distinguish between legitimate traffic and malicious attempts, just as they would need to in production. Furthermore, virtualized platforms often allow customization of traffic profiles, attack intensities, and encryption parameters, giving testers the ability to mirror their unique operational environment. The result is a highly realistic validation process that produces actionable insights about system resilience, scalability, and potential blind spots.
One of the most significant advantages of a virtualized security test platform is the flexible licensing and scaling model it enables. Instead of being limited by the throughput of a physical appliance, organizations can start with modest capacity, perhaps testing a single firewall, virtual private network, or secure web gateway, and then expand seamlessly to validate large-scale distributed systems. Licensing models are typically consumption-based or subscription-based, allowing enterprises to align investment with usage. For instance, a team may run intensive tests only during specific development cycles or compliance audits, and scale back during quiet periods, optimizing cost efficiency. In addition, because the solution is virtual, scaling can occur horizontally across cloud or virtualized infrastructure, leveraging additional compute resources rather than requiring new hardware purchases. This model supports both small labs and global enterprises with complex, multi-site deployments.
Modern security test platforms rely on continuously updated threat intelligence feeds to remain relevant. These updates typically cover new application behaviors, emerging attack vectors, malware campaigns, and advanced evasion techniques observed in the real world. Updates are delivered directly into the emulation library, ensuring that testing reflects the current threat landscape without requiring manual scripting or configuration by the end user. This process is particularly critical given how rapidly cyber threats evolve; an outdated test library would provide a false sense of security. By staying aligned with the latest vulnerabilities and exploits, organizations can validate whether their defenses can withstand current and future attack methods. Beyond simple updates, some platforms also offer the ability to customize and build new attack profiles, giving advanced users the flexibility to model unique threats relevant to their industry or environment. This ensures that testing not only covers known risks but also anticipates potential future attack strategies.