Choose a country or area to see content specific to your location
What are you looking for?
WirelessPro empowers you to model, simulate, and analyze various aspects of 5G networks, 5G Advanced technologies, and future 6G wireless channels with unparalleled ease and accuracy.
Get faster, clearer insights with our new multicore, 12-bit oscilloscope up to 33 GHz.
Emulate every part of your data center infrastructure. Emulate Anything. Optimize Everything.
Accelerate signal analysis testing with Keysight’s VSA software. Visualize, demodulate, and troubleshoot with over 75+ signal standards with precision.
With extra memory and storage, these enhanced NPBs run Keysight's AI security and performance monitoring software and AI stack.
Achieve fast, accurate board-level testing with robust inline and offline ICT designed for modern manufacturing.
Explore curated support plans, prioritized to keep you innovating at speed.
Pinpoint interference with post-processing spectrum management software in the lab.
Our high-density ATE power supplies end trade-offs between test throughput and precision.
Explore engineer-authored content and a vast knowledge base with thousands of learning opportunities.
Keysight Learn offers immersive content on topics of interest, including solutions, blogs, events, and more.
Quick access to support related self-help tasks.
Additional content to support your product needs.
Explore services to accelerate every step of your innovation journey.
Keysight CyPerf software is a true cloud-native testing solution for applications and security, capable of recreating realistic user and network workloads across both physical and cloud-based environments. It scales elastically—supporting millions of users and connections per second—and enables validation of performance and security in modern distributed infrastructures like Secure Access Service Edge (SASE), Zero Trust Network Access (ZTNA), and hybrid architectures. CyPerf supports emulation of encrypted traffic, VPNs, and real-world application behaviors, delivering meaningful insights under scale. Request a quote for one of our popular configurations today. Need help selecting? Check out the resources below.
Simulates SSL, TLS, and IPsec traffic at scale to validate security controls and visibility into encrypted environments.
Runs natively in public, private, or hybrid clouds, allowing performance and security validation across distributed architectures.
Supports testing for SASE, Zero Trust, SD-WAN, and VPN scenarios to ensure resilience under real-world conditions.
Delivers elastic performance testing that scales with network growth, enabling consistent validation from lab to production.
938-1101
CyPerf Starter Bundle with 2 Agents and up to 2 Gbps (30-days subscription).
938-1100
CyPerf Starter Bundle with 2 Agents and up to 10 Gbps (30-days subscription).
Innovate at speed with curated support plans and prioritized response and turn-around times.
Get predictable, lease-based subscriptions and full lifecycle management solutions—so you reach your business goals faster.
Experience elevated service as a KeysightCare subscriber to get committed technical response and more.
Ensure your test system performs to specification and meets local and global standards.
Make measurements quickly with in-house, instructor-led training, and eLearning.
Download Keysight software or update your software to the newest version.
Emulating real user behavior requires generating traffic that mirrors not only protocol-level activity but also application-layer actions—such as accessing SaaS services, downloading files, or initiating video calls. Tools like CyPerf offer a rich library of application flows (HTTP/S, DNS, VoIP, Office 365, Zoom, etc.) and allow you to configure traffic patterns with customizable rates, session durations, payload sizes, and encryption protocols. Furthermore, traffic can be distributed across geographically dispersed test endpoints to simulate users in different locations accessing cloud-hosted applications. This emulation helps assess how the network handles concurrent sessions, latency-sensitive tasks, and encrypted traffic, all under real-world load conditions.
Validating Zero Trust requires demonstrating that least-privilege access, segmentation, and inspection policies are consistently enforced across all users, devices, and applications. Zero Trust test solutions supports this by placing agents on both sides of a trust boundary, such as between branches and cloud zones, or users and microservices, and attempting various access scenarios. It emulates allowed and denied traffic, uses encrypted protocols (TLS 1.2/1.3), and includes role-based traffic flows to test authentication and policy enforcement. Reports then detail if and where policies fail, whether packets were dropped or encrypted improperly, and how long it took to establish secure sessions. This allows teams to pinpoint misconfigurations or blind spots in their Zero Trust architecture.
To measure the performance cost of security enforcement, you need to generate controlled traffic through the network path and compare baseline metrics with and without security devices in place. Zero Trust test solutions does this by creating highly repeatable flows at L2–L7, including encrypted sessions, to stress firewalls, secure web gateways, IDS/IPS, and cloud-native security services. It records granular metrics such as throughput, latency, jitter, packet loss, and session setup time. Engineers can then analyze how SSL inspection, application filtering, or deep packet inspection impacts end-user experience under a realistic load. This enables data-driven tuning of security policies without sacrificing performance targets.
SASE and SD-WAN architectures rely heavily on policy-driven routing, encrypted tunnels, dynamic path selection, and cloud-based inspection, all of which must be validated under varying network conditions. Effective simulation tools like CyPerf support distributed agent deployment, allowing you to place traffic generators at branches, cloud gateways, and core nodes. These agents can initiate application-specific traffic flows while measuring performance across tunnels (e.g., IPSec, GRE, SSL VPN) and under failover or degradation conditions. They also emulate security scenarios, such as access from unmanaged devices or attempts to reach restricted SaaS apps, helping teams verify if dynamic policy enforcement, identity-based segmentation, and performance SLAs are met consistently across the SASE or SD-WAN fabric.