Keysight’s on-premises solutions as well as cloud-based solutions in RSA 2022

2022-06-20 Keysight
Flex taps,iBypass switches,Threat Simulator,inline and out-of-band Vision ONE network packet brokers

It’s been two long years. Actually two years, 3 months, and 14 days since the last live RSA show ended. This one is now in the history books as well.

 

It was good to see old friends and get back to some sort of normalcy. Attendance at the show was light this year with about 26,000 attendees but it was a good start to getting over the long dark COVID-19 winter.

 

At the Keysight booth, we were showing off our on-premises solutions as well as our cloud-based solutions. These solutions included:  Flex taps and iBypass switches, inline and out-of-band Vision ONE network packet brokers, Threat Simulator, and CyPerf.

 

While these solutions can be deployed individually, they are a potent force when deployed together. For instance, here is one example of how to mix taps, bypass switches, packet brokers, and Threat Simulator.

 

First, you can create a formidable inline security solution to reduce as many vulnerabilities within the network as possible. For instance, by combining the external iBypass switch along with the Vision ONE packet broker you can create a high availability solution that improves the operation and reliability of your inline security tools [like a web application firewall (WAF) or intrusion prevention system (IPS)].

 

Second, Keysight Flex taps can be combined with an out-of-band Vision ONE packet broker to give you access to the specific packets that your security hunting tools need to find intrusions that made it past your inline security solution. This tap, packet broker, and threat hunting tool solution allow you to find and quickly remediate intrusions that are discovered in the network.

 

The third part of an effective security solution is to use Keysight’s Threat Simulator, which is a breach and attack simulation (BAS) solution, to periodically test your network defenses to make sure they are actually detecting and blocking threats. While the architecture that you have created may seem really effective, you just don’t know until you put it to the test. However, you want to be the one testing your network – not a hacker.

 

A fourth solution at the show was CyPerf. CyPerf is a scalable zero trust test solution for distributed cloud. This subscription-based software solution re-creates every aspect of a realistic workload across a variety of physical and cloud environments. The CyPerf solution delivers insights into end-user experience, security posture, and performance bottlenecks.

 

See for yourself how Keysight’s security-focused solutions can significantly enhance your company’s security architecture!


  • +1 Like
  • Add to Favorites

Recommend

This document is provided by Sekorm Platform for VIP exclusive service. The copyright is owned by Sekorm. Without authorization, any medias, websites or individual are not allowed to reprint. When authorizing the reprint, the link of www.sekorm.com must be indicated.

Contact Us

Email: