Technical Insights > Network Visibility + Security

      Data Center Visibility – Go Big or Stay Blind

      Network Visibility + Security

      Data Center Visibility – Go Big or Stay Blind

      Jason Lackey 2020.12.04

      One of my coworkers, Guang Zhang, who is one of those quiet, smart, thoughtful people (more or less the opposite of your humble narrator), spent a fair amount of time putting together a really cool pi

      5 min read

      Ryuk Revealed: Breaking Down the Latest Ransomware Threat to Healthcare and Beyond

      Network Visibility + Security

      Ryuk Revealed: Breaking Down the Latest Ransomware Threat to Healthcare and Beyond

      Mike Hodge 2020.11.19

      Ransomware Never Sleeps If you’re active in security circles, you’ve probably noticed a recent spate of ransomware which have been particularly troublesome to the healthcare segment. We’ve been gettin

      6 min read

      #Network Security #Cybersecurity

      Cool Packet Broker Tricks - Deduplication

      Network Visibility + Security

      Cool Packet Broker Tricks - Deduplication

      Jason Lackey 2020.11.17

      One of the dirty secrets of networking is that there is usually a fair amount of duplicate traffic on a network, particularly when network visibility solutions are in play. This may seem counterintuit

      5 min read

      Cool Packet Broker Tips - Load Balancing

      Network Visibility + Security

      Cool Packet Broker Tips - Load Balancing

      Jason Lackey 2020.11.13

      What is a packet broker? In short a packet broker is a specialized switch that enables network administrators to supply the traffic needed, and only the traffic needed, to security and analytics tools

      4 min read

      The Importance of NetFlow Reliability

      Network Visibility + Security

      The Importance of NetFlow Reliability

      Bogdan Dinu 2020.11.02

      Network Security, Monitoring and Analysis tools can be classified in many ways, including by the way they ingest traffic – some can ingest raw data, a.k.a. the full packet streams, others can ingest a

      9 min read

      Do you really know how long a network failure takes to recover?

      Network Visibility + Security

      Do you really know how long a network failure takes to recover?

      Joel Rudman 2020.10.28

      Customers routinely engage our Professional Service Team here at Keysight, to test new infrastructure and configurations. We test to validate if the network equipment is performing as designed and whe

      7 min read

      Raccoon Malware Kill Chain Added to BreakingPoint Attack Campaigns

      Network Visibility + Security

      Raccoon Malware Kill Chain Added to BreakingPoint Attack Campaigns

      Network Apps & Security Blog Team 2020.10.27

      By Kang-Wei Chang  |  Keysight’s Application and Threat Intelligence (ATI) research team released a new type of cyber-attack campaign this month. BreakingPoint Attack Campaigns are a group of attacks

      6 min read

      #Network Security #Cybersecurity