www.keysight.com Open in urlscan Pro
104.110.11.239  Public Scan

Submitted URL: https://www.keysight.com/us/en/products/network-security/breach-defense/threat-simulator.html
Effective URL: https://www.keysight.com/us/en/products/network-security/threat-simulator.html
Submission: On April 23 via api from US — Scanned from NO

Form analysis 3 forms found in the DOM

<form id="samlAuthForm">
  <input type="hidden" id="cookieDomain" value=".keysight.com">
  <input type="hidden" id="ssoAuthPath" value="https://www.keysight.com/ssoauth">
  <input type="hidden" id="loginURL" value="https://www.keysight.com/us/en/passive-saml.login.html?env=https%3A%2F%2Fwww.keysight.com%2Fus%2Fen%2Fproducts%2Fnetwork-security%2Fthreat-simulator.html">
  <input type="hidden" name=":isSharedResource" value="undefined"><input type="hidden" name=":isVideoResource" value="undefined">
</form>

<form>
  <label for="select-locale" class="visually-hidden">Select locale</label>
  <select id="select-locale"></select>
  <button>Confirm</button>
  <input type="hidden" name=":isSharedResource" value="undefined"><input type="hidden" name=":isVideoResource" value="undefined">
</form>

GET /etc/keysight/elastic/product/search

<form id="search-lookahead-form" action="/etc/keysight/elastic/product/search" method="GET">
  <label for="search-lookahead-input" class="visually-hidden">Search</label>
  <input name="modelId" id="search-lookahead-input" autocomplete="off" placeholder="Search Keysight.com" maxlength="255">
  <button id="search-lookahead-submit" type="submit" aria-label="Search">
    <img src="/etc/designs/keysight/clientlibs/head/img/eclipse/icon-search-white.svg" alt="Search" title="Search">
  </button>
  <input type="hidden" name="currentPagePath" value="/content/keysight/us/en/products/network-security/threat-simulator">
  <input type="hidden" name="currentPageName" value="threat-simulator">
  <input type="hidden" name="redirectTo" value="product">
  <input type="hidden" name="basePath" value="/us/en">
  <input type="hidden" name="langCd" value="en">
  <input type="hidden" name="cntryCd" value="us">
  <input type="hidden" name=":isSharedResource" value="undefined"><input type="hidden" name=":isVideoResource" value="undefined">
</form>

Text Content

Enable accessibility
___




Here's the page we think you wanted. See search results instead:

Choose a country or area to see content specific to your location

Norway
 * 中国
 * 日本
 * 繁體中文
 * 한국
 * Brasil
 * Canada
 * Deutschland
 * France
 * India
 * Malaysia
 * United Kingdom
 * Norway

Enable browser cookies for improved site capabilities and performance.
Enable Javascript and browser cookies for improved site capabilities and
performance.


Toggle Menu
Chat Live
Contact Us

WELCOME

 * 
 * My Profile
 * Logout

 * Login
 * Register



Confirm Your Country or Area

United States United States

 * 中国
 * 日本
 * 繁體中文
 * 한국
   
 * Brasil
 * Canada
 * Deutschland
 * France
 * India
 * Malaysia
 * United Kingdom
 * United States
 * Australia
 * Austria
 * Belgium
 * Denmark
 * Finland
 * Hong Kong, China
 * Ireland
 * Israel
 * Italy
 * Mexico
 * Netherlands
 * Singapore
 * Spain
 * Sweden
 * Switzerland (German)
 * Thailand
 * Vietnam
 * more...

Please Confirm

Confirm your country to access relevant pricing, special offers, events, and
contact information.

Select locale Confirm

 * PRODUCTS AND SERVICES
    * Oscilloscopes
       * Real-Time Oscilloscopes — General Purpose
       * Real-Time Oscilloscopes — Compliance
       * Equivalent-Time Sampling Oscilloscopes
       * Handheld, Modular, and USB Oscilloscopes
       * Oscilloscope Software
       * Oscilloscope Probes
       * All Oscilloscopes  
   
    * Analyzers
       * Spectrum Analyzers (Signal Analyzers)
       * Network Analyzers
       * Logic Analyzers
       * Protocol Analyzers and Exercisers
       * Bit Error Ratio Testers
       * Noise Figure Analyzers and Noise Sources
       * High-Speed Digitizers and Multichannel DAQ Solutions
       * AC Power Analyzers
       * DC Power Analyzers
       * Materials Test Equipment
       * Device Current Waveform Analyzers
       * Parameter / Device Analyzers and Curve Tracers
   
    * Meters
       * Digital Multimeters
       * Phase Noise Measurement
       * Power Meters and Power Sensors
       * Counters
       * LCR Meters and Impedance Measurement Products
       * Picoammeters and Electrometers
   
    * Generators, Sources, and Power Supplies
       * Signal Generators (Signal Sources)
       * Waveform and Function Generators
       * Arbitrary Waveform Generators
       * Pulse Generator Products
       * HEV / EV / Grid Emulators and Test Systems
       * DC Power Supplies
       * Source / Measure Units
       * DC Electronic Loads
       * AC Power Sources
   
    * Software
       * EDA Software
       * Instrument Measurement Software
       * Instrument Workflow Software
       * Software Testing
       * All Design and Test Software  
   
    * Wireless
       * Channel Emulation
       * IoT Regulatory Compliance
       * Wireless Drive Test
       * Radio Access and Core Network Test
       * Wireless Analyzers
       * Wireless Network Emulators
       * 5G NR Base Station Test
       * Over-The-Air Test
   
    * Modular Instruments
       * PXI Products
       * AXIe Products
       * Data Acquisition Systems (DAQ)
       * USB Products
       * VXI Products
       * Reference Solutions
       * All Modular Instruments  
   
    * Network Test and Security
       * Application and Threat Intelligence
       * Cloud Test
       * Cyber Training Simulator
       * Network Test Hardware
       * Synthetic Traffic Generators
       * Protocol and Load Test
       * Network Security Test
       * Network Modeling
       * All Network Test and Security  
   
    * Network Visibility
       * Bypass Switches
       * Clock Synchronization
       * Cloud Visibility
       * Network and Application Monitoring
       * Network Packet Brokers
       * Network Taps
       * All Network Visibility  
   
    * Services
       * KeysightCare
       * Calibration Services
       * Repair Services
       * Technology Refresh Services
       * Test as a Service — TaaS
       * Network / Security Services
       * Consulting Services
       * Financial Services
       * Education Services
       * Keysight Support Portal
       * Used Equipment
       * All Services  
   
    * Additional Products
       * In-Circuit Test Systems
       * Application-Specific Test Systems and Components
       * Parametric Test Solutions
       * Photonic Test and Measurement Products
       * Laser Interferometers and Calibration Systems
       * Monolithic Laser Combiners and Precision Optics
       * MMIC Millimeter-Wave and Microwave Devices
   
    * All Products, Software, Services  

 * Learn
    * Resources
    * Use Cases
    * Industries
    * Events
    * Blogs
       * Product Area
       * Industry
       * Inside Keysight
   
    * About Keysight

 * Buy
 * Support
    * Product Support
    * Software Download Center



Welcome |
Exit Procurement Session
 * View and Transfer Cart
 * Discard Cart and End Procurement Session


WHAT ARE YOU LOOKING FOR?

Search
MXG Signal Generator UXA Signal Analyzer UXM for Wi-Fi 7 PXA Signal Analyzer
Find a solution Get technical support Take a class Find us at events Premium
used equipment KeysightCare Buy online
Suggested searches

No product matches found - System Exception
Matched content
See all Search Results

 * Home
 * Products and Services
 * Network Security Test
 * Threat Simulator

 * 


THREAT SIMULATOR

Continuously validate your security posture and stay safe from the latest
threats

Stay Safe from the Latest Threats
Request Demo





FEATURED RESOURCES

MSSP Partner Program



Become a partner with the world’s largest test and measurement company and grow
your revenue



Latest Cyber Threats Report



Read our monthly summary of the latest cyber-attacks that are covered by Threat
Simulator




Keysight Threat Simulator for Healthcare Providers



Read our guide written by security and networking experts who understand the
Healthcare industry









THREAT SIMULATOR SANS REVIEW

SANS had the opportunity to explore the Threat Simulator platform from Keysight
Technologies, which has a very strong background in attack simulation and
controls validation. In the review, SANS found Threat Simulator to be:


 * Packed with a comprehensive set of attack and testing scenarios and use cases
 * Easy to use, with an intuitive interface and ample visualization capabilities
   that make it simple to build complex attack paths
 * Highly capable of automating any types of assessments we could imagine, which
   allows for nuanced testing and repeatability
 * Enabled for continuous validation thanks to easy scheduling of assessment




Webcast



Listen to the SANS webcast for Threat Simulator — Fortify Your Defenses with
On-Demand Simulated Attacks



Whitepaper



Read the 2022 Product Review of Threat Simulator conducted by SANS









YOU'RE NOT AS SAFE AS YOU THINK YOU ARE

Here are real world examples of what we have found for our partners and
customers:

 * For a global food and beverage manufacturer, Threat Simulator found that 80 %
   of attacks were not being blocked
 * For a local government council in the US, Threat Simulator revealed that 70 %
   of attacks were getting through perimeter defenses because they didn't have
   SSL inspection in place
 * For a US FinTech, Threat Simulator found their web application firewall (WAF)
   was missing 32 % of high-severity web application attacks and 50 % of all
   security attacks
 * For a Legal Practice, Threat Simulator found 100 % of phishing and email
   security attacks were getting through and 73 % of content filtering

Stay Safe from the Latest Threats

To view this video please enable JavaScript, and consider upgrading to a web
browser that supports HTML5 video



Video Player is loading.
Play Video
Play
Mute

Current Time 0:00
/
Duration 3:47
Loaded: 4.90%


0:00
Stream Type LIVE
Seek to live, currently behind liveLIVE
Remaining Time -3:47
Â
1x
Playback Rate
 * 2x
 * 1.5x
 * 1x, selected
 * 0.5x

Chapters
 * Chapters

Descriptions
 * descriptions off, selected

Captions
 * captions off, selected

Audio Track

Picture-in-PictureFullscreen

This is a modal window.







VERTICALS

 * HEALTHCAREHEALTHCARE
 * PUBLIC SECTORPUBLIC SECTOR
 * FINANCEFINANCE
 * INDUSTRIALINDUSTRIAL

 * With patient data and safety paramount, how can you be sure your existing
   security tools are effective against threats? The risk to patient security
   and data and the costs of cybercrime are rising. New threats emerge every
   day, so much so that the FDA has underlined the importance of monitoring and
   assessing cybersecurity risks for connected devices. Keysight's solutions are
   used by leading healthcare organizations to help solve many of the core
   components of a Zero Trust model: device security, network security,
   visibility tools, and validation.
   
   
   Healthcare Providers' Guide to Cyber Security
   Learn More
   
   To view this video please enable JavaScript, and consider upgrading to a web
   browser that supports HTML5 video
   
   
   
   Video Player is loading.
   Play Video
   Play
   Mute
   
   Current Time 0:00
   /
   Duration 5:36
   Loaded: 3.35%
   
   
   0:00
   Stream Type LIVE
   Seek to live, currently behind liveLIVE
   Remaining Time -5:36
   Â
   1x
   Playback Rate
    * 2x
    * 1.5x
    * 1x, selected
    * 0.5x
   
   Chapters
    * Chapters
   
   Descriptions
    * descriptions off, selected
   
   Captions
    * captions off, selected
   
   Audio Track
   
   Picture-in-PictureFullscreen
   
   This is a modal window.
   
   
   
   

 * Many public sector organizations don't always have the time or resources to
   keep up with the growth of cybersecurity threats. Keysight is helping public
   sector organizations identify security gaps and assess the effectiveness of
   future investments. For example, we helped one public sector organization by
   revealing that 70 percent of attacks were getting through perimeter defenses
   because the organization didn't have Secure Sockets Layer (SSL) inspection in
   place. Read how we can help public sector organizations reduce cyber risk.
   
   Stay Safe from the Latest Threats
   Learn More
   
   

 * Financial services are highly regulated, and with potentially lucrative
   targets for hackers that succeed in overcoming defenses, the costs of a
   security breach for Financial Services firms are high. Read how we can help
   finance organizations reduce cyber risk. One US fintech asked Keysight to
   check its defenses; we found that they were missing 32 percent of
   high-severity web application attacks and 50 percent of all security attacks
   — even though they had DDoS protection and NGFWs in place. Read how we can
   help finance organizations reduce cyber risk.
   
   
   Stay Safe from the Latest Threats
   Learn More
   
   

 * OT environments are evolving fast. As the attack surface grows, IoT devices
   become an attractive target for hackers making it vital to have continuous
   visibility of threats. Read how we can help industrial organizations reduce
   cyber risk and ensure that all tools are configured effectively by simulating
   potential attacks on OT devices. We have joined forces with SCADAfence to
   allow security teams to run simulations of attacks.
   
   Stay Safe from the Latest Threats
   Learn More
   
   


WHY KEYSIGHT THREAT SIMULATOR


 * AWARD WINNING
   
   Threat Simulator is an award-winning Breach and Attack Simulation (BAS)
   solution with a wide range of tests and recommendations, including MITRE
   ATT&CK endpoint, user and network assessments. We have 20,000 tactics,
   techniques, and procedures (TTPs), including MITRE ATT&CK.
   
    * Winner: Most Innovative, Breach and Attack Simulation, Global Infosec
      Awards 2022
    * Winner: Cybersecurity Excellence Awards 2020
    * Winner: Breach and Attack Hot Company, Global Infosec Awards 2021
    * Finalist: Interop, Best of Show Award 2020
   
   
   


 * A TRUSTED GLOBAL BRAND
   
   We operate in 100 countries with global service desks operating 24x7. We have
   14,300 employees, including a global security services group with deep
   expertise in all major verticals. We invest 16 percent of revenue, over USD
   700 million in R&D across 20 R&D sites. We are part of a large family of
   services and products, we understand security, networks, and software across
   different interfaces, platforms, browsers, and devices, including mobile,
   IoT, desktop, and mainframe.
   
   
   


 * 100 % RECOMMENDATION SCORE
   
   Read what the reviewers had to say
   
   
   

‹ ›

123


RELATED INFORMATION


 * DATA SHEET – KEYSIGHT THREAT SIMULATOR
   
   A Breach and Attack Simulation (BAS) platform built on 20+ years of
   leadership in network security testing, Threat Simulator enables you to
   empower your SecOps team by continuously assessing your network's readiness
   against the latest attacks and exploits.
   
   Learn More
   
   


 * WHITEPAPER – APPLICATION AND THREAT INTELLIGENCE RESEARCH CENTER
   
   The ATI Research Center combines proficiency in cybersecurity threats and
   application protocol behavior. This unique combination takes network security
   to a new level, looking at it the same way as a cybercriminal, from every
   direction.
   
   Learn More
   
   

‹ ›

12


BE A HERO, NOT A HEADLINE

Don't wait for attackers to test your defenses. Contact us today to start
strengthening your network security defenses.


Contact Us


Back to Top

Explore

 * Products + Services
 * Solutions
 * Industries
 * Events
 * Learn
 * Used Equipment

Insights

 * Discover Insights
 * Success Stories
 * Resources
 * Blog
 * Community

Partners

Support

 * Product Support
 * Manage Software Licenses
 * Product Order Status
 * Parts

About Keysight

 * Newsroom
 * Investor Relations
 * Quality and Security
 * Corporate Social Responsibility
 * Diversity, Equity, and Inclusion
 * Modern Slavery Act Transparency Statement
 * Careers



 * 

 * © Keysight Technologies 2000–2024
 * Privacy
 * Sitemap
 * Terms
 * Trademark Acknowledgements
 * Feedback
 * Accessibility

United States

Dear Keysight Web Site Customer,
Providing high levels of customer satisfaction is one of our top priorities at
Keysight. To better understand your needs and where we need to improve, we
invite you to complete a short (5-minute) Web site satisfaction survey.
As a thank-you for your input, we will enter you in a drawing to be one (1) of
five (5) recipients of a $75 US gift card (Amazon or similar depending on
location).
The sweepstakes is void where prohibited, open to those over 18 years of age and
each winner will be required to sign and return the Keysight Declaration and
Release Form.
 * Drawing Terms & Conditions

Please complete the survey as soon as possible after you have finished with your
visit to the Keysight Web site.
We value your honest feedback and thank you in advance for your participation.
The information you provide will help us create a Web site that better meets
your needs.
Yes, I would like to participate
No, I do not want to participate