Zero Trust Validation

散页

Keysight’s CyPerf is the world’s first instantly scalable and elastic agent-based  test solution for zero trust in hybrid, distributed cloud networks. It recreates  every aspect of a realistic workload across a variety of physical and cloud  environments to deliver insights into end user experience, cybersecurity posture,  and performance bottlenecks of distributed networks. 

 

Test agents send application and attack traffic simultaneously through hybrid  networks, security devices and zero trust implementations to validate scalability,  performance, and security efficacy.

 

Challenges to testing Scalability and Performace of zero trust implementations

 

• Characterizing the security efficacy of zero trust strategies especially with lateral network movement and/or inside sourced attacks

• Accessing quantifiable data and key performance indicators like throughput, concurrent users, latencies, and quality of experience before and after implementing zero trust controls

• Assessing the functionality, performance, and scale of the zero trust authentication engines on a continuous basis to monitor for any undesirable deviations

• Demonstrating to customers and stakeholders the immediate value of zero trust implementations through live-traffic, and custom proof of concepts (POCs)

 

CyPerf—Your Solution to Ensuring a Scalable and Secure Zero Trust Framework

 

• Generate authenticated and unauthenticated application traffic and security attacks to validate zero trust authentication policies

• Characterize the performance, scale and responsiveness of zero trust  implementations by generating thousands of authentication requests and  concurrent sessions in a repeatable manner

• Simulate lateral movement attacks where un-authenticated attacks attempt to  propagate throughout the network

• Support is built-in for HTTP Redirect and authentication/session cookie to create  custom application flows and scenarios for unparalleled flexibility

• Support for millions of connections per second and tens of millions of  concurrent users

 

Validate Zero Trust

 

Generate authenticated and unauthenticated application traffic and security attacks to validate zero trust authentication policies. Characterize the performance, scale, and responsiveness of the zero trust implementations by generating thousands of authentication requests for up to 60 million concurrent users.

×

请销售人员联系我。

*Indicates required field

请选择您希望的是德科技与您沟通的方式*必填项
Preferred method of communication? 更改电子邮件地址?
Preferred method of communication?

请通过单击按钮,提供给是德科技您的个人数据。请在Keysight隐私声明 中,参阅有关我们如何使用此数据的信息,謝謝。

感谢您!

A sales representative will contact you soon.