Keysight Technologies to Highlight Cybersecurity Solutions at RSA 2022
Keysight Technologies (NYSE: KEYS) recently announced its participation in the RSA Conference 2022 from June 6-9 at Moscone Center, San Francisco. As a leader in application and security testing, Keysight aims to address the complexities brought by cloud, SD-WAN, edge computing, and IoT. The company will showcase innovative solutions, including network digital twins for cyber defense, and highlight tools for mitigating IoT risks. With a revenue of $4.9B in FY 2021, Keysight emphasizes its ongoing commitment to security and innovation in technology.
- Demonstrating advanced cybersecurity tools at RSA Conference 2022.
- Highlighting network digital twins that enhance cyber defense capabilities.
- Emphasizing solutions for IoT security risks, showcasing innovation.
- None.
What: |
A global leader in application, device, and security testing, Keysight accelerates innovation to connect and secure the world. Cloud, software-defined wide area networks (SD-WAN), edge computing, and the Internet of Things (IoT) are transforming the way enterprises do business. But these new opportunities also bring unprecedented complexity which requires a new evidence-based approach to cybersecurity. | |
Whether strengthening network defenses, or safeguarding critical infrastructure, Keysight enables organizations secure tomorrow’s technology. | ||
When: |
|
|
Where: |
Moscone Center, |
Live demonstrations at Keysight’s booth N-5873:
Simulate Attacks with a Digital Twin
- The use of a network digital twin allows enterprises to easily test against multiple variables to reduce recurring costs and lead times. Performing tests with digital twins can play a key role in helping to defend networked systems against evolving cyber threats. EXata Cyber offers the perfect blend of reliable emulation software and ample cyber capabilities to create an accurate network digital twin that improves security and protect vital networks from cyber threats.
- Enterprises have massive volumes of data and traffic flowing in and out of networks plus legions of applications to keep running. Not only do they have to maintain peak performance, but they also have to make sure their systems are secure from bad actors and malicious threats. Keysight’s network visibility portfolio offers insight into an entire network to see every packet, reveal blind spots, pinpoint performance drags, and proactively identify vulnerabilities.
- Distributed cloud networks with advanced traffic patterns, complex application mixes, and no defined perimeter demand a new zero trust approach to security where nothing is trusted, and everything is authenticated. Testing these dynamic networks requires a complete paradigm shift. Yesterday’s test tools won’t work in today’s modern networks. Supporting millions of connections per second and tens of millions of concurrent users, CyPerf enables an enterprise to quantify the unknowns and control the chaos of digital transformation.
- Those who develop, deploy, and operate IoT devices have a tremendous challenge to quickly spot, diagnose, and resolve security weaknesses in connected devices. These security weaknesses can range from protocol vulnerabilities in communication chipsets to application-layer weaknesses. Keysight’s IoT Security Assessment offers an integrated solution for discovering lurking vulnerabilities – before someone else does.
Accelerate DevOps with Artificial Intelligence
-
Keysight’s Eggplant Test and Automation Intelligence delivers continuous testing throughout the software development lifecycle. It enables users to reduce the software development lifecycle by
50% , automate up to75% of regression testing and run functional testing up to three times faster.
Mitigate Risk with Breach & Attack Simulation
- Keysight’s Threat Simulator simulates attacks on a network to uncover blind spots and proactively identify gaps and misconfigurations — before an attacker does.
Keysight technology experts will host in-booth presentations where attendees will learn about key topics and challenges associated with cybersecurity including network visibility, device security, threat simulation, CyPerf use cases, software test automation, digital twins, and security, and CyPerf and Threat Simulator demonstrations.
Visit the booth for partner sessions including:
- Phishing with Dynamite: Intelligence-driven Visibility for Operational Technology (OT) Security with Nozomi
- Advanced Threat Network Visibility and Protection with Trelix
-
Threat Detection and Response in the Hybrid Cloud with
Vectra - Get Deeper for Better MITRE ATT&CK Detection with ExtraHop
- Industrial Control System (ICS) Visibility and Threat Detection with Forescout
Speaker Highlights
Media may contact
About
Keysight delivers advanced design and validation solutions that help accelerate innovation to connect and secure the world. Keysight’s dedication to speed and precision extends to software-driven insights and analytics that bring tomorrow’s technology products to market faster across the development lifecycle, in design simulation, prototype validation, automated software testing, manufacturing analysis, and network performance optimization and visibility in enterprise, service provider and cloud environments. Our customers span the worldwide communications and industrial ecosystems, aerospace and defense, automotive, energy, semiconductor, and general electronics markets. Keysight generated revenues of
Additional information about
View source version on businesswire.com: https://www.businesswire.com/news/home/20220525005705/en/
+1 609-994-7442
beth.hespe@keysight.com
+81 42 660-2162
fusako_dohi@keysight.com
Source:
FAQ
What is Keysight showcasing at the RSA Conference 2022?
When is Keysight participating in the RSA Conference?
Where is the RSA Conference 2022 held?
What is Keysight's revenue for fiscal year 2021?