Keysight Technologies is a leading provider of Network Test and Security solutions that will enable large-scale testing of network infrastructures with simulated traffic, checking effectiveness with simulated breaches and attacks, and gaining visibility of every packet passing through the network.
Learn moreTesting resistance to attacks
Secure, reliable and responsive networks rely on Keysight. More than 20 years of experience has enabled Keysight to provide Threat Simulator, a Breach and Attack Simulation (BAS) platform that simplifies the continuous checking of your security and optimising the effectiveness of your security operations team (SecOps). The solution directly addresses the requirements of new regulations (NIS2, DORA) for verifying and auditing the effectiveness of security systems. The platform automatically and continuously measures risks and identifies vulnerabilities. To find gaps, misconfigurations and rule deviations, Threat Simulator securely simulates real-world attacks, from malware transmission and exfiltration to lateral movement in segmented networks and endpoints. It then provides recommendations to help optimise security levels and costs.
Key benefits
Increased security - vulnerabilities can be quickly identified and remediated through continuous and automated security testing.
Ensuring regulatory compliance - BAS technology helps meet regulatory requirements and industry standards for security.
Increased efficiency of security teams - by automating testing processes, teams can focus on more strategic tasks.
Main features
Simulation of attacks
The platform allows for realistic simulations of different types of cyber attacks, such as phishing, malware attacks, ransomware, and other techniques used by cyber criminals. This allows organisations to see how their security systems handle real-world threats.
Security assessment
Keysight Threat Simulator assesses the effectiveness of current security mechanisms, such as firewalls, intrusion detection and prevention systems (IDS/IPS), and anti-virus solutions. The platform provides detailed reports on which attacks have been blocked and which could compromise the network.
Tracing vulnerabilities
The platform identifies vulnerabilities in security systems that can be exploited by cybercriminals. This enables quick action to patch these vulnerabilities before they are used for real attacks.
Test automation
Keysight Threat Simulator enables the automation of penetration tests and attack simulations, enabling regular security health checks without the need for extensive human resources.
Reporting and analysis
The Threat Simulator platform offers advanced reporting and analysis tools to provide detailed reviews of test results and identify areas for improvement. These reports can be used to communicate with management teams and to plan defence strategies.
Integration with SIEM systems
Keysight Threat Simulator can be integrated with security information and event management (SIEM) systems, enabling central monitoring and management of security test results and immediate response to detected threats.
Education and training
The Threat Simulator platform can be used for training purposes, helping IT and security teams to better understand threats and improve their incident response skills.
Main use cases
Continuous safety assessment
Simulate various attack scenarios to identify security vulnerabilities in real time and take immediate corrective action.
Assessment of the effectiveness of defence mechanisms
Testing existing protection systems, such as firewalls, intrusion detection systems and anti-virus solutions, to assess their effectiveness in real-world conditions.
Incident response team training
Simulating security incidents to test the preparedness and response of crisis management teams.
Optimisation of security policies
Analyse simulation results to improve and adapt security policies and procedures to changing threats.
Testing of contingency plans
Simulating attacks and failures to assess the effectiveness of disaster recovery plans and business continuity strategies.
Risk management
Obtain detailed vulnerability and risk reports, allowing for better risk management and resource allocation.