Latest White Papers

White Papers 2022.01.25

Deploying an Inline Security Architecture: Key Considerations

Deploying an Inline Security Architecture: Key Considerations

The key to efficient inline security monitoring is to enable fail-safe tool deployment, maximize traffic inspection, and protect network availability. To address these issues, many organizations are deploying a highly resilient security architecture. With this approach, you can get access to 100% of your physical and virtual network traffic, increase monitoring tool efficiency, apply security-specific intelligence to improve threat detection, and achieve near instant fail-over.

2022.01.25

White Papers 2022.01.25

Best Practices and Use Cases for Network Visibility

Best Practices and Use Cases for Network Visibility

Network visibility enables IT teams to quickly isolate security threats and resolve performance issues. This white paper provides examples of how to tighten security, reduce costs, accelerate troubleshooting, remove blind spots, and optimize performance.

2022.01.25

White Papers 2022.01.13

Best Practices for Lawful Intercept in Service Provider and Enterprise Networks

Best Practices for Lawful Intercept in Service Provider and Enterprise Networks

Supporting lawful data intercept requests is becoming increasingly important for service providers. At the same time, it has also become a new challenge for enterprises. The world’s nations are writing laws legally mandating access to communications, and expanding access to all types of user information including voice, video, data, and even location information. It does not stop there as the requirements and legal application of laws vary by country, and even by state. This paper provides a basic overview of lawful data intercept, as well as some recommendations for best practices to help you meet basic compliance for several of the mandated lawful intercept scenarios.

2022.01.13

White Papers 2022.01.12

Electric and Autonomous Vehicles Transform the Aerospace and Defense Industry

Electric and Autonomous Vehicles Transform the Aerospace and Defense Industry

Electric and autonomous vehicle technology advances are ushering in a new era in aerospace and defense. The test and measurement industry must work to enable further advancements to allow the industry to fully realize the benefits of this transformation.

2022.01.12

White Papers 2022.01.11

Architecting For Security Resilience

Architecting For Security Resilience

Continuous investment is what drives today’s network security. Threats evolve rapidly so enterprises must add, maintain, and upgrade their frontline security multiple times per year. What was once a firewall now also includes a next-gen firewall, web-application firewall (WAF), intrusion detection and prevention system, forensics tools and more. You purchase security tools to protect your network, but what have you done to protect your tools? Vendors recommend that enterprises place security tools inline of the traffic flow to inspect live traffic. This paper provides best-practice guidelines on how to deploy the most resilient inline security framework. The result will reduce network downtime, enable upgrading tools with zero network impact, and extend the useful life of your security investments.

2022.01.11

White Papers 2022.01.11

Preparing Your Network for GDPR: Frequently Asked Questions

Preparing Your Network for GDPR: Frequently Asked Questions

General Data Protection Regulation (GDPR) will go into effect on May 25, 2018 and impact all organizations that conduct business in the European Union (EU), offer goods or services to residents of the EU, or monitor the online behavior of EU residents. GDPR is a multi-faceted regulation and no single solution will ensure compliance, but strengthening network security and preventing data loss is key. Keysight is working with customers around the globe to help them increase their visibility to the information crossing their network, so they are better prepared for the upcoming changes. This FAQ document provides key information on GDPR for those making decisions about network and application security.

2022.01.11

White Papers 2022.01.10

Best Practices for Monitoring Virtual Environments

Best Practices for Monitoring Virtual Environments

Enterprise IT administrators face numerous challenges when migrating and running their critical application workloads in diverse environments – branch office, virtualized data center, private and public cloud. Also, widescale adoption of new technologies such as SD-WAN and micro-segmentation impact security and application quality of experience in these environments. The paper addresses six key considerations to ensure service resilience in virtual environments, and the importance of providing pervasive data access to the right tool, at the right time, and in the right place.

2022.01.10

White Papers 2022.01.10

What You Need to Know for a Successful Zero Trust Security Deployment

What You Need to Know for a Successful Zero Trust Security Deployment

The Zero Trust model of security is increasingly being adopted by enterprise and government security teams, and with good reason. Learn how to maximize the value of your Zero Trust architecture by deploying it correctly.

2022.01.10

White Papers 2022.01.09

Signal Analysis - Four Tips for 5G New Radio

Signal Analysis - Four Tips for 5G New Radio

Strong demand for faster-data-rate applications has triggered the need for cellular technologies capable of wide signal bandwidth operating at higher frequencies. The wider bandwidths and higher frequency for 5G NR bring in new design and test challenges. Learn about four tips to help you successfully analyze 5G NR signals and get your designs to market faster.

2022.01.09

White Papers 2022.01.07

Visibility Architecture – Eliminating Visibility and Security Blind Spots

Visibility Architecture – Eliminating Visibility and Security Blind Spots

According to ZK Research, 85% of the mean time to repair (MTTR) is the time taken to identify there is in fact, an issue. If your IT department cannot quickly identify problems, chances are they will constantly hear about issues from unhappy customers. And once the MTTR clock starts ticking, there’s no telling whether IT knows there is an issue or not. If you’re trying to ensure your networks are fast, reliable and secure through approaches that attempt to manage each aspect of their performance—from Network Ops, Application Ops, Security Admins, Server Admins, Forensics, and Privacy and Audit teams—chances are that each of these teams purchased their own set of analytics or monitoring tools. For many, these solutions have not solved the problem, leaving unidentified blind spots that remain a looming threat. In this insightful white paper, Visibility Architecture: Eliminating Visibility and Security Blind Spots, you’ll learn about a once-in-a-generation change that’s creating a shift to public and private cloud computing, virtualized networking, and the growing number of connected devices are structurally changing IT. What you will learn: First, what are the components of good visibility and security? Second, how a visibility architecture can give you 100% ROI, with vastly improved problem identification, isolation, and repair times. Third, how you can effectively comport with many compliance mandates. Fourth, achieve end-to-end visibility for both physical and virtual networks. Fifth, don’t wait for disjointed approaches to security and visibility to create an unforeseen problem. Read this white paper to get the insights you need to make better decisions.

2022.01.07

White Papers 2022.01.06

Fast Breach Mitigation Without Network Disruption

Fast Breach Mitigation Without Network Disruption

A recent report from Verizon revealed that nearly 68% of breaches happen over the course of several days. Ponemon Institute indicates that it is now taking longer to resolve these attacks, averaging 46 days, an increase of 30% over the last six year period in the time required to resolve it. With events like this unfolding with growing frequency, your ability to quickly mitigate a crisis begins with knowing where it occurred, and what data was compromised. This insightful white paper, Fast Breach Mitigation Without Network Disruption, examines how to capture the critical data you need, to respond more rapidly to emerging situations.

2022.01.06

White Papers 2022.01.06

5 Ways To Maximize the Value of Security & Monitoring Tools

5 Ways To Maximize the Value of Security & Monitoring Tools

Return on investment is an important factor for evaluating the value of your security infrastructure. This informative white paper, 5 Ways to Maximize the Value of Security and Monitoring Tools, guides you through the most cost-effective solutions, including the role of a visibility architecture in your network design to help maximize monitoring effectiveness.

2022.01.06

Latest Case Studies

Case Studies 2021.12.10

Time Saved in the Race for Controlling Quantum Dot Qubits

Time Saved in the Race for Controlling Quantum Dot Qubits

Quantum technology provides the means to achieve breakthroughs in computing. The team at RIKEN’s Quantum Functional System Research Group are focused on technologies to control the quantum state to process information faster with low energy consumption. To make this happen, they focus on establishing one stable qubit then scaling it up to many. In the work of stabilizing a single qubit, noise is a common challenge.

2021.12.10

Case Studies 2021.11.23

Youngstown State University Upgrades EE Teaching and Research Labs

Youngstown State University Upgrades EE Teaching and Research Labs

This case study reviews how Youngstown State University examined a key factor in new student recruiting, and how they worked with Keysight to ensure their EE program, especially in microelectronics, will be competitive with other regional schools. Combining new equipment, remote access capabilities and industry-ready experience, Youngstown now uses their upgraded labs as a key differentiator in a highly competitive market.

2021.11.23

Case Studies 2021.11.10

Ixia vTaps and Vision ONE Addresses Changing Government Infrastructure

Ixia vTaps and Vision ONE Addresses Changing Government Infrastructure

This federal agency was moving to a fully virtualized data center, which introduced significant monitoring blind spots for east-west traffic. Investing in Keysight's virtualized visibility platform, the agency eliminated blind spots caused by east-west traffic and improved the effectiveness of their monitoring solutions.

2021.11.10

Case Studies 2021.11.09

Putting the Future in Motion with Automotive Ethernet

Putting the Future in Motion with Automotive Ethernet

Automobile innovating is accelerating at a rapid pace. Built-in infotainment systems—information and entertainment—demand higher speed wireless connections. Advanced electronic safety and convenience systems, built with cameras, radar, and lidar, are driving exponential data growth. All this data is traveling on wired networks inside next-generation vehicles.

2021.11.09

Case Studies 2021.11.05

Global Automotive Component Manufacturer Uses PMA to Speed Up Root Cause Analysis

Global Automotive Component Manufacturer Uses PMA to Speed Up Root Cause Analysis

With the concurrent outbreak of the pandemic and chip shortage, time to market is extremely crucial in fulfilling the market demand. This accelerates the demand and adoption for all kinds of IOT devices and analytical tools that can help with manufacturing health monitoring and maintaining high FPY (First Pass Yield). Nevertheless, there’s still a lot of opportunities to improve, especially in the functional test process. Root causing functional test failures can be difficult and complex. In this case study we will elaborate on how PMA enabled near real-time RCA of the equipment fixture issues on the production floor that caused a low yield scenario.

2021.11.05

Case Studies 2021.10.19

Semiconductor Maker Implements New Test for Automotive Ethernet

Semiconductor Maker Implements New Test for Automotive Ethernet

Automotive Ethernet demands rigorous compliance verification and simulation of real-life workloads. Learn how a chipset maker solves these challenges for both the PHY and networking layers.

2021.10.19

Case Studies 2021.09.10

Meeting Increasing Customer Demand Without Budget Consequences

Meeting Increasing Customer Demand Without Budget Consequences

KeysightAccess provides a complete business solution to help a network equipment manufacturer acquire the test solution and service they need now.

2021.09.10

Case Studies 2021.09.10

KIOXIA Accelerates PDK Development by using Keysight Device Modeling Software

KIOXIA Accelerates PDK Development by using Keysight Device Modeling Software

KIOXIA accelerates PDK development by using Keysight Device Modeling Software. The modeling efficiency is increased 10X, and the model accuracy is improved in long-term prediction.

2021.09.10

Case Studies 2021.09.02

Company Reduces Costs $680K While Improving Security

Company Reduces Costs $680K While Improving Security

This case study illustrates how valuable network visibility is to a security architecture. In this solution, an external bypass and network packet broker (NPB) are combined to strengthen an inline security solution by reducing unnecessary solution costs by $680,000 USD, reducing complexity, and implementing high availability to maintain maximum uptime for the security architecture. See for yourself how you can reduce risk while reducing cost at the same time.

2021.09.02

Case Studies 2021.08.09

Cook Children’s Healthcare System Improves Application Experience Using Network Intelligence

Cook Children’s Healthcare System Improves Application Experience Using Network Intelligence

Cook Children's Health Care System is a not-for-profit, nationally recognized pediatric health care organization that operates a medical center, physician network, hospital, pediatric surgery center and health plan. Founded in 1918 and based in Fort Worth, Texas, the integrated system has more than 60 primary and specialty care offices throughout North Texas. They needed to improve their network visibility and monitoring practices to solve application performance and SPAN port contention issues. Read this case study to learn how they reduced their mean time to repair for network issues from days to hours and increased monitoring tool efficiency.

2021.08.09

Case Studies 2021.07.28

Photonic Systems Group at McGill University Overcomes Test Limitations in Optoelectronic Research

Photonic Systems Group at McGill University Overcomes Test Limitations in Optoelectronic Research

McGill University is known for their state of the art optical communications research. Read this case study to learn why McGill researchers selected the Keysight UXR oscilloscope and M8190 Series arbitrary waveform generator for their lab, and how those instruments improved their test accuracy.

2021.07.28

Case Studies 2021.07.26

Shorten Dynamic Frequency Selection Test Time from Days to Hours

Shorten Dynamic Frequency Selection Test Time from Days to Hours

Modern requirements in wireless regulatory compliance tests are challenging because they require significant behavior sequences and timing. A leading wireless networking company in the United States specializing in servers, storage, and networking services was having trouble running these tests. This case study highlights how Keysight's IOT0047A regulatory test solution and IoT regulatory compliance software help shorten the DFS test time.

2021.07.26

Latest eBooks

eBooks 2022.01.25

10 Things You Must Know Before Buying Your Next Benchtop Digital Multimeter

10 Things You Must Know Before Buying Your Next Benchtop Digital Multimeter

This eBook explores 10 things that you should know about digital multimeters and the key specs you need to consider before buy a digital multimeter.

2022.01.25

eBooks 2022.01.18

Geek to Guru Guide: Eliminating Network Blind Spots

Geek to Guru Guide: Eliminating Network Blind Spots

Creating a zero-loss network visibility architecture will help you avoid dangerous blind spots and quickly identify network vulnerabilities. Partial visibility is not enough so don’t settle for anything less than the full picture.

2022.01.18

eBooks 2022.01.17

Four Functions That Enhance Your Network Analysis

Four Functions That Enhance Your Network Analysis

This eBook explores advanced network analyzer functions that give you faster, deeper insights into your devices.

2022.01.17

eBooks 2022.01.13

Geek to Guru Guide to Offensive Security

Geek to Guru Guide to Offensive Security

When it comes to network security, “good enough” is not enough. With a world full of bad actors hammering at your digital door, you need to fight back and meet them head on. That means hacking yourself to find and fix vulnerabilities — before an attacker can exploit them. As you read through this guide, you’ll discover the benefits of taking an offensive approach to security. Whether you’re looking to stop configuration drift, stay ahead of the latest attacks, or prevent misconfigurations from jeopardizing your network, you’ll get the insights you need to take control of a rapidly changing threat landscape.

2022.01.13

eBooks 2022.01.12

5 Ways to Improve ROI with Network Packet Brokers

5 Ways to Improve ROI with Network Packet Brokers

A compelling ROI analysis is the difference between a successfully funded IT project, and one that gets canceled. This is especially true for relatively new technologies that are not well understood by IT management.By reading this eBook, you will learn five different ways you can use network packet brokers (NPBs) to improve your network architecture ROI: expedite troubleshooting, detect breaches faster, reduce the processing burden on your existing tools, extend tool life after a network upgrade, and streamline regulatory compliance.

2022.01.12

eBooks 2021.12.01

Engineering for Advanced Radar and Electromagnetic Spectrum Operations

Engineering for Advanced Radar and Electromagnetic Spectrum Operations

The nations and their forces are progressing toward a new era of modernization. These technological advancements leave no stone unturned for the dominance of the electromagnetic spectrum. The use of EM spectrum across all domain’s targets EM energy for detection, denial, and deception – either to protect or to destruct. This book is an attempt to highlight the advancements, the challenges, and innovative test and measurement solutions.

2021.12.01

eBooks 2021.11.18

5 Areas AI-Driven Test Automation Improves the Online Shopping Experience

5 Areas AI-Driven Test Automation Improves the Online Shopping Experience

As shopping habits from physical engagement to online, retailers must offer a digital omnichannel experience that keeps their customers coming back for more. User-centric test automation of the digital buyer's journey is essential to deliver an immersive experience wherever the customer may be.

2021.11.18

eBooks 2021.11.04

Four Secrets to Mastering Millimeter-Wave Communications Circuit Design

Four Secrets to Mastering Millimeter-Wave Communications Circuit Design

In this eBook, you will learn four EDA secrets to mastering mmWave communications circuit design and how to streamline your design workflow to achieve first-pass success.

2021.11.04

eBooks 2021.10.20

Millimeter-Wave Receiver Calibration Made Easier, Cheaper, and Faster

Millimeter-Wave Receiver Calibration Made Easier, Cheaper, and Faster

The U9361 RCal Receiver Calibrator allows you to achieve accuracy, efficiency, and value by moving the reference plan to the device under test. Find out how in this eBook.

2021.10.20

eBooks 2021.10.18

5G & Beyond For Dummies®, Keysight Technologies Special Edition

5G & Beyond For Dummies®, Keysight Technologies Special Edition

Find out about 5G technologies and their associated challenges. Discover solutions available to address these challenges and ways you can create new opportunities for your organization.

2021.10.18

eBooks 2021.09.22

The 5 C's + 1 of IoT

The 5 C's + 1 of IoT

Many individuals and organizations use IoT devices to increase productivity and profit. While IoT devices offer great convenience, having large numbers of them in a small space increases complexity in device design, test, performance, and security. Testing these devices is one of the biggest challenges today’s design engineers and device manufacturers face. Learn about testing the 5 C's + 1 C of IoT:• Connectivity• Continuity• Compliance• Coexistence• Cybersecurity• Customer experienceEnsure that your complex IoT device reaches the pinnacle of its performance limit through this eBook.

2021.09.22

eBooks 2021.08.06

The Essential Guide for Understanding O-RAN

The Essential Guide for Understanding O-RAN

The document is a fundamental introduction on O-RAN, a revolutionary solution for mobile network operators to deploy an open, disaggregated, virtualized, and intelligent RAN network. The eBook discusses a number of aspects mobile network operators need to consider before deployment.

2021.08.06

Latest Solution Briefs

Solution Briefs 2022.01.26

Get More Value from Security and Monitoring Tools

Get More Value from Security and Monitoring Tools

In this timely and insightful solution brief, the team at Ixia gives you a relative overview of the issues at play. In it, you’ll learn how you can increase the value of out-of-band and inline tools, what role do visibility architectures play, and how to allow for immediate inline and out-of-band access points to check for intrusions.

2022.01.26

Solution Briefs 2022.01.25

Automatically Trigger Packet Capture from HP ArcSight to Accelerate Incident Remediation

Automatically Trigger Packet Capture from HP ArcSight to Accelerate Incident Remediation

The integrated Keysight network visibility and HP ArcSight solution automatically sends the right traffic to the right security tool at the right time.

2022.01.25

Solution Briefs 2022.01.25

Palo Alto Networks and Keysight Technologies Intelligence to Secure the Enterprise

Palo Alto Networks and Keysight Technologies Intelligence to Secure the Enterprise

Make sure the foundation your security tools connect to is as secure and scalable as the tools themselves. Ixia's Vision ONE and iBypass combine with Palo Alto Networks next-gen firewalls to create a solution that scales as you need to – quickly, securely, and reliably. Download the solution brief to learn more.

2022.01.25

Solution Briefs 2022.01.25

Plixer + Keysight: Increase Your Network, Application, and Security Visibility

Plixer + Keysight: Increase Your Network, Application, and Security Visibility

Keysight's Network Visibility solution (NVS) complements Plixer by generating enriched flow data (IxFlow) from across the data center and sending it to Scrutinizer for analysis.

2022.01.25

Solution Briefs 2022.01.25

Complete Network Visibility For Real User Experience Management

Complete Network Visibility For Real User Experience Management

The Keysight Vision ONE and the Oracle Real User Experience Insight (RUEI) product work together to capture and analyze network traffic in a scalable solution that accurately and efficiently monitors networks of any size.

2022.01.25

Solution Briefs 2022.01.25

VOIP/IMS Real-Time Security Monitoring and Analytics Solution from NextGen and Keysight

VOIP/IMS Real-Time Security Monitoring and Analytics Solution from NextGen and Keysight

Keysight's network visibility solutions provide complete access to the carrier network traffic that the NextGen IDS and Network Forensic system NX-C6000/NX-C6500 need for analysis.

2022.01.25

Solution Briefs 2022.01.25

Keysight + Niometrics: Complete Visibility for Better Network Intelligence

Keysight + Niometrics: Complete Visibility for Better Network Intelligence

Keysight's network visibility solutions work with Niometrics appliances to capture and analyze traffic in a scalable solution for any size network.

2022.01.25

Solution Briefs 2022.01.24

Imperva and Keysight: Defend Sensitive Applications and Data

Imperva and Keysight: Defend Sensitive Applications and Data

DDoS attacks and large-scale botnets can wreak havoc on even large, robust websites that handle lots of traffic. Moreover, cyber attackers are constantly looking for network security gaps to steal data. With Imperva web and database protection appliances, plus Keysight Visibility solution, you’re able to defend sensitive applications and data, meet regulatory requirements, and maximize availability.

2022.01.24

Solution Briefs 2022.01.24

Harnessing Network Visibility To Reduce Mean Time To Repair

Harnessing Network Visibility To Reduce Mean Time To Repair

A network visibility architecture can be deployed to allow IT to install solutions that access, aggregate, refine, and distribute critical troubleshooting data. This data can then be used to isolate and identify network problems as quickly as possible to restore optimal functionality.

2022.01.24

Solution Briefs 2022.01.24

Limit Breach Damage with Data Filtering

Limit Breach Damage with Data Filtering

As data breaches become a daily concern, the question becomes not if, but when a data breach will affect you. Automating your security deployment with customized data filtering should be a top priority so that breach damage is kept at a minimum. Read this solution brief to understand how Keysight's data filtering can help protect your network and your wallet.

2022.01.24

Solution Briefs 2022.01.24

Network Visibility for Cyber Defense of DWDM, OTN and SONET/SDH Networks

Network Visibility for Cyber Defense of DWDM, OTN and SONET/SDH Networks

Network visibility to enhance security for DWDM, OTN and SONET/SDH networks.

2022.01.24

Solution Briefs 2022.01.24

Creating Resilience Within A Security Architecture

Creating Resilience Within A Security Architecture

Read this solution brief to see how you can: strengthen your capabilities to defend against attacks; maximize your ability to rebound from an attack; minimize the severity and cost of security breaches.

2022.01.24

Latest Brochures

Brochures 2022.01.21

Keysight Application Bundles

Keysight Application Bundles

This brochure highlights some of the application bundles (Radar, 5G, WLAN, Sat Comm) available for the customers.

2022.01.21

Brochures 2022.01.17

Test Module Overview - 5G

Test Module Overview - 5G

This brochure summarizes the Test Modules that are being released by the Keysight’s Professional Services team to help customers achieve a faster return on investment (ROI) in their performance of testing.

2022.01.17

Brochures 2022.01.12

2022 Keysight Hardware Calendar

2022 Keysight Hardware Calendar

See how Keysight's design, test, and measurement solutions fit into iconic scenes around the world in this beautiful 2022 calendar.

2022.01.12

Brochures 2021.12.13

PathWave Vector Signal Analysis (89600 VSA)

PathWave Vector Signal Analysis (89600 VSA)

This brochure provides an overview of the powerful signal analysis capabilities of the 89600 VSA software.

2021.12.13

Brochures 2021.12.12

P705xA O-RAN Radio Unit Test Automation Solution

P705xA O-RAN Radio Unit Test Automation Solution

This product brochure describes the P705xA O-RAN Radio Unit Test Automation Solution that is used in design verification test (DVT) and conformance test of an O-RAN Radio Unit (O-RU).

2021.12.12

Brochures 2021.12.09

Instrument Lifecycle Solutions

Instrument Lifecycle Solutions

Key to our technology and management services are our Instrument Lifecycle Solutions, which include unique offerings for the Warranty., Standard Service., and Extended Service.

2021.12.09

Brochures 2021.12.08

FieldFox Handheld Analyzer Software

FieldFox Handheld Analyzer Software

This brochure discusses the common software option bundles for FieldFox according to application. See how you can configure your unit to meet your test needs.

2021.12.08

Brochures 2021.11.15

Nemo Outdoor

Nemo Outdoor

Nemo Outdoor from Keysight Technologies, Inc. has an established position both as a pioneer and leader in drive test measurement solutions. This brochure introduces the key features and benefits of Nemo Outdoor.

2021.11.15

Brochures 2021.11.05

Nemo Handy

Nemo Handy

Nemo Handy is a solution for thorough and advanced measurement and optimization of wireless air interface and mobileapplication Quality-of-Service and Quality-of-Experience.

2021.11.05

Brochures 2021.11.03

PNA and PNA-X Series Microwave Network Analyzers

PNA and PNA-X Series Microwave Network Analyzers

Learn about the PNA and PNA-X network analyzers in this brochure.

2021.11.03

Brochures 2021.11.02

Nemo Walker Air

Nemo Walker Air

Nemo Walker Air is solution for performing indoor measurements and benchmarking.

2021.11.02

Brochures 2021.10.28

Worldwide Education Services

Worldwide Education Services

To get the most from your Ixia test platform, you need the formal training provided by Ixia’s Worldwide Educational Services. Training can be especially valuable to those new to Ixia equipment and applications specifically, or to IP testing in general. Better-trained technicians can answer more of their own questions and take additional diagnostic steps toward resolving device-under-test and test application problems, reducing calls to Ixia support and speeding deployment of products and services. Training benefits include: - More rapid, higher return on your Ixia test platform investment - Fast track to Ixia application proficiency – producing more productive testers - Shorten product and service development cycles because your test professionals will get it right the first time - Proficiency to employ more of the features and capabilities of Ixia’s products, resulting in more thoroughly-tested products - Develop confidence and self-esteem, increasing employee morale. Ixia training options are continually updated to coincide with the latest test application releases. Continued use of Ixia training allows your staff to move to new product releases seamlessly.

2021.10.28

Latest Catalogs

Catalogs 2022.01.23

Keysight Basic Instruments January 2022

Keysight Basic Instruments January 2022

This catalog contains Keysight Basic Instruments through January 2022 and includes new limited-time offers.

2022.01.23

Catalogs 2022.01.13

IoT Device Battery Life Test Solutions Catalog

IoT Device Battery Life Test Solutions Catalog

Finding the optimal balance between battery protocol and software functionality to get reliable performance and service life requires an in-depth understanding of battery life and current drain. With its many current and power measurement technology patents, Keysight Technologies has extensive experience in making these measurements. Let’s explore Keysight’s hardware and software test solutions that can help extend the battery life in your designs.

2022.01.13

Catalogs 2021.11.19

Data Center High-Speed Computing Products Catalog

Data Center High-Speed Computing Products Catalog

This document provides an overview of Keysight High-Speed Computing Solutions, including PCI Express, DDR test, and USB transmitter and receiver test.

2021.11.19

Catalogs 2021.11.18

RF Products Catalog

RF Products Catalog

Learn about essential RF tools, and explore Keysight’s signal generators, spectrum analyzers, network analyzers, and more.

2021.11.18

Catalogs 2021.11.10

Software for Automotive Applications Solutions Catalog

Software for Automotive Applications Solutions Catalog

Behind Keysight’s high-precision hardware lies powerful software designed to fuel innovation by streamlining automotive electronics test. Whether you need to analyze and generate standards-compliant automotive radar signals, simulate multiple driving scenarios, or perform end-to-end security testing, explore Keysight’s automotive software solutions.

2021.11.10

Catalogs 2021.11.03

Network Visibility Products Catalog

Network Visibility Products Catalog

Network visibility enables you to keep performance high and security tight. Learn more and explore Keysight network packet brokers, bypass switches, taps, and fabric controller.

2021.11.03

Catalogs 2021.11.01

Signal Analysis Solutions Catalog

Signal Analysis Solutions Catalog

Keysight signal analysis solutions help you overcome test challenges from basic general purpose RF to leading-edge microwave designs. Find out which hardware and software best meet your needs.

2021.11.01

Catalogs 2021.10.11

High-Performance Digital Products Catalog

High-Performance Digital Products Catalog

Today’s laboratory requires best-in-class measurement and stimulus tools to help validate tests now and in the future. Learn more about the oscilloscope, arbitrary waveform generator and BERT products available from Keysight.

2021.10.11

Catalogs 2021.08.26

PathWave Design and Test Software Catalog

PathWave Design and Test Software Catalog

Accelerate your design and test workflow with Keysight’s PathWave software. Increase your productivity with automation and simulation software; extend the capabilities of your test equipment with test software, and innovate anywhere with PC and web-based software. Find out more about PathWave design and test software in this catalog.

2021.08.26

Catalogs 2021.08.12

Bench Power Supply Products Catalog

Bench Power Supply Products Catalog

Keysight E3600 Series Basic DC Power Supplies are an affordable family of power supplies with many models, including programmable units ideal for basic applications and bench use.

2021.08.12

Catalogs 2021.06.29

PXI / AXIe Modular Products Catalog

PXI / AXIe Modular Products Catalog

Keysight modular PXI and AXIe test solutions help you test highly integrated devices with speed and accuracy. Find out which hardware and software best meet your needs and see time-saving document test solutions for specific measurement applications.

2021.06.29

Catalogs 2021.06.14

Engineering Essentials Oscilloscopes Catalog

Engineering Essentials Oscilloscopes Catalog

Whether you use a scope once a day, once a week, or once a month, InfiniiVision scopes are ready to inspire quicker insight.

2021.06.14

Catalogs 2021.05.12

EXR-Series Catalog

EXR-Series Catalog

This catalog covers all of the Infiniium EXR-Series oscilloscopes, their capabilities and much more, giving you the chance to see if an EXR-Series oscilloscope is a good fit for your needs and applications. With eight models ranging in performance from 500 MHz to 2.5 GHz, four or eight channels, and dozens of hardware and software options, the Infiniium EXR-Series is powerful, easy to own, and intuitive to use. Find answers to: Why consider an EXR? Specifications and features, the EXR-Series portfolio, and easy application support for general-purpose debug, power integrity test and measurement, switch-mode power (SMPS) testing, and serial bus testing.

2021.05.12

Catalogs 2021.05.11

Network Analyzer Products Catalog

Network Analyzer Products Catalog

Market-leading Keysight network analyzers help you characterize passive devices to leading-edge microwave designs. Find out which hardware and software best meet your needs.

2021.05.11

Catalogs 2021.05.10

Power Supply and Analyzer Rental Products Catalog

Power Supply and Analyzer Rental Products Catalog

The widespread adoption of hybrid-electric vehicles (HEV) and electric vehicles (EV) has pushed theadvancement of EV battery technologies to become more economically viable. Learn about technology advancements and challenges automotive manufacturers face today.

2021.05.10

Catalogs 2021.05.04

Education Solutions Catalog

Education Solutions Catalog

Catalog for Keysight products used in education solutions for students and educators / researchers.

2021.05.04

Catalogs 2021.04.26

Digital Multimeter Products Catalog

Digital Multimeter Products Catalog

This 11-page DMM Product Catalog features the Truevolt Series 6½- and 7½- Digit Bench Digital Multimeters, PXI Digital Multimeters, Specialty Digital Multimeters, and Handheld DMMs.

2021.04.26

Catalogs 2021.04.26

Waveform and Function Generator Solutions Catalog

Waveform and Function Generator Solutions Catalog

The Keysight Waveform and Function Generator Solutions Catalog features general purpose function generators with basic arbitrary waveform capabilities, as well as Trueform signal generation technology with superior signal fidelity providing the highest resolution, lowest distortion and lowest jitter when compared to DDS function/arbitrary waveform generators.

2021.04.26

Catalogs 2021.04.23

Bench and Power Products Catalog

Bench and Power Products Catalog

Today’s designs are increasingly portable and connected. Troubleshooting DC to RF technologies requires a variety of instruments, and Keysight offers the deepest bench in the industry.

2021.04.23

Catalogs 2021.04.15

High-Volume Traffic Generator Products Catalog

High-Volume Traffic Generator Products Catalog

Get the highest performance and most realistic workloads to validate across the stack from protocols to services, applications, and cybersecurity. Explore Keysight high-volume traffic generators.

2021.04.15

Catalogs 2021.03.26

Signal Generation Solutions Catalog

Signal Generation Solutions Catalog

Keysight offers a wide range of instruments to help you generate the signals required to effectively test your device. Meet your design objectives with our selection of analog, RF, and leading-edge microwave signal generators and software.

2021.03.26

Catalogs 2021.03.23

High-Performance Digital Rental Products Catalog

High-Performance Digital Rental Products Catalog

Today’s laboratory requires best-in-class measurement and stimulus tools to help validate tests now and in the future. Learn more about the oscilloscope, arbitrary waveform generator and BERT products available from Keysight.

2021.03.23

Catalogs 2021.03.03

Smart Bench Essentials Series Products Catalog

Smart Bench Essentials Series Products Catalog

Keysight's Smart Bench Essentials Series is a connected solution of test instruments consisting of a power supply, function generator, digital multimeter, and an oscilloscope. With this new complete portfolio of instruments, students, and general electronic test engineers will have a truly connected, modern design solution for their lab or test workbenches.

2021.03.03

Catalogs 2021.01.08

Electronic Warfare Threat Simulation Solutions Catalog

Electronic Warfare Threat Simulation Solutions Catalog

Unlock the future of technology to secure the world with help form your partner in electronic warfare solutions. Find hardware and software solutions to power your newt breakthrough today.

2021.01.08

Latest Application Notes

Application Notes 2022.01.14

Quick Tips to Improve Network Performance

Quick Tips to Improve Network Performance

Learn how you can use a visibility architecture to improve performance monitoring activities and: 1. Capture performance-related data as fast as possible to get the best quality data possible. 2. Capture the right types of data that you need and distribute that data to your purpose-built monitoring tools. 3. Harness the power of application intelligence to improve the quality and speed of your monitoring and analysis activities.

2022.01.14

Application Notes 2022.01.14

Quick Tips to Improve Network Security

Quick Tips to Improve Network Security

Read this application note to learn how to optimize the availability and reliability of inline security devices; isolate and capture the right kind of data for the security tools to process; perform active SSL decryption for improved data inspection and simplification of the decryption infrastructure; and improve the efficiency and accuracy of your current security architecture.

2022.01.14

Application Notes 2022.01.13

Quick Tips to Improve Network Compliance

Quick Tips to Improve Network Compliance

Read this application note to learn how to create a visibility architecture that can lower this risk by capturing better compliance data to create improved audit trails.

2022.01.13

Application Notes 2022.01.13

Quick Tips to Create Self-Provisioning Packet Brokers

Quick Tips to Create Self-Provisioning Packet Brokers

The usability of the NPB determines productivity increases and total cost of ownership (TCO) savings. Therefore, the system must not only be easy to set up, but must be easy to maintain as well. Read this application note to learn how to overcome key issues for network monitoring systems.

2022.01.13

Application Notes 2022.01.12

Barcode Scanning Implementation

Barcode Scanning Implementation

See how you can set up a barcode scanner on the i7090 Massively Parallel In-Circuit Test System without needing an operator to manually scan the barcode on PCBs.

2022.01.12

Application Notes 2022.01.06

LF Noise Measurement with Switch Matrix Mainframe

LF Noise Measurement with Switch Matrix Mainframe

The E4727B Advanced Low-Frequency Noise Analyzer enables fast, accurate and repeatable low-frequency noise (LFN) measurements on numerous device types. Now, thanks to tight integration with Keysight’s WaferPro Express software, device modeling and characterization engineers can now add noise measurements to a larger suite that includes high-speed DC, capacitance and RF S-parameter measurements, all the while automating wafer prober control.

2022.01.06

Application Notes 2022.01.05

EVM: The Heart of Everything Wireless

EVM: The Heart of Everything Wireless

Learn how EVM connects to power amplifier or transceiver design goals for wireless applications such as 5G and satellite communications, as well as tips and recommendation on how to achieve them.

2022.01.05

Application Notes 2022.01.04

Why Migrate from the 4155C and 4156C to the B1500A?

Why Migrate from the 4155C and 4156C to the B1500A?

This application note shows you the advantages of migrating from 4155C/56C to B1500A.

2022.01.04

Application Notes 2022.01.04

Quick Tips on Security Resilience

Quick Tips on Security Resilience

The security resilience concept is a recommendation by NIST. Unlike a defensive security approach (which is about prevention), security resilience focuses on "after breach" activities. The basic assumption is that it is not "if" your network be attacked but "when". To that end, your architecture should have the capability to understand that a breach has occurred and begin remediating the damage incurred. The reason for focusing on this strategy is simple—you want to reduce costs. These activities, if done right, will help you reduce the costs of a breach either directly by limiting the data stolen, or by decreasing the financial amount of each fine incurred, and in turn, minimizing bad publicity.This application note provides some quick tips to show you how the following issues can be reduced:Threat discovery timeCompany riskComponent recovery and validation time

2022.01.04

Application Notes 2021.12.14

Virtual Reference Design from Wolfspeed

Virtual Reference Design from Wolfspeed

This application note serves as a guide to using a PathWave ADS workspace to simulate a virtual version of a physical reference design from Wolfspeed Model CRD-HB12N-J1. This model showcases the Silicon Carbide (SiC) power transistors (C3M0032120J1 series) from Wolfspeed. This guide provides instructions on how to start building your next-generation switched-mode power supply. The reference design – in both virtual and physical forms - is a good starting point for your own project.

2021.12.14

Application Notes 2021.12.09

SMH FR2.0 Performance on i7090

SMH FR2.0 Performance on i7090

This document introduces how to use i7090 power relay board and how to expand power channel.

2021.12.09

Application Notes 2021.12.02

Battery Solutions for Wireless Devices Use Cases

Battery Solutions for Wireless Devices Use Cases

This is an app note which outlines use cases for battery manufacturers or battery-powered device designers.

2021.12.02

Want help or have questions?