Page 2Find us at www.keysight.com
Solution: Proactive, Continuous Security Validation
To ensure a strong defense, organizations need to embrace an offensive approach that
employ up-to-date threat intelligence to continuously verify their Enterprise-wide security
controls are working as expected and are optimized for maximum protection.
With Keysight’s Threat Simulator, Enterprises can measure their security posture, gain
insights into the effectiveness of their security tools and obtain actionable remediation
steps to improve it.
With this data, you can start optimizing the existing security solutions so that you can
improve your security without adding another expensive security solution.
Keysight Threat Simulator™ builds on 20+ years of leadership in network security
testing to reveal your security exposure across public, private, and hybrid networks.
The ongoing research of our Application and Threat Intelligence team ensures regular
updates so you have access to the latest breach scenarios and threat simulations.
Key features
• Offers a flexible cloud-based breach and attack simulation platform that scales as
your network grows
• Actionable remediation recommendations help you improve and optimize your
security controls
• Light, container-based software agents are infrastructure agnostic allowing
operations on-premise, private and public clouds, and remote user laptops
• Minutes to the first security insight
• Fully managed “Dark Cloud” infrastructure to simulate external hackers, malicious
hosts and C&C in the public domain
• Offers a modern, easy to use web-based interface
• Built-in integration with top network security controls and SIEM tools
• Diversified library of threat vectors, attack techniques and data exfiltration methods
• Out-of-box experience to simulate the full infection Killchain for popular breaches
and APTs
• Scheduler to enable continuous security assessments across your Enterprise-wide
network
• Elastically scales Threat Simulation agents
• SIEM-proxy agent facilitates communication with SIEM tools
• Built-in packet capture support
• Visual ladder diagrams complement the predefined security assessments
• Agent tagging supports user-provided metadata to each agent to better manage
agents
• Agent grouping creates abstraction layers allowing simple and rapid validations of
multiple network segments at once