Keysight stories - Page 2
Keysight buys AI testing specialist Eggplant for $300m
Mon, 29th Jun 2020
#
devops
#
apm
#
ai
Keysight Technologies acquires digital automation specialist Eggplant for USD $330 million, enhancing its stake in the automated software test market.
Security professionals over-confident in security products
Tue, 18th Feb 2020
#
cloud security
#
cybersecurity
#
cyber attacks
Security professionals are over-confident when it comes to effectiveness of their security products, according to a new survey released by Keysight.
Ixia enhances active network monitoring platform with machine learning
Tue, 4th Feb 2020
#
semiconductors
#
ixia
#
network monitoring
Keysight Technologies' business Ixia has incorporated machine learning technologies into its network monitoring platform.
Survey: IT pros nostalgic over on-prem data centre visibility
Tue, 26th Mar 2019
#
private cloud
#
hybrid cloud
#
hyperscale
There are significant security and monitoring challenges faced by IT staff responsible for managing public and private cloud deployments.
OPPO aims to have 5G device launched by end of year
Tue, 15th Jan 2019
#
uc
#
semiconductors
#
5g & beyond
The Chinese smartphone manufacturer is working with Keysight Technologies to accelerate the development of their 5G smartphone.
Keysight showcases solutions to accelerate innovation in end-to-end mission-critical IoT
Mon, 23rd Jul 2018
#
iot
#
keysight
#
iot marketplace
Nemo Handy IoT provides operators with in-depth information on their IoT network's key performance indicators.
Hillstone Networks announces new data centre firewall solution
Thu, 5th Jul 2018
#
firewalls
#
network infrastructure
#
network security
Hillstone Networks has unveiled the X10800, a next-gen data centre firewall offering up to 7 Tbps throughput, aimed at securing expansive cloud infrastructures.
Five steps to ensure persistent data security across your network
Wed, 2nd May 2018
#
firewalls
#
network infrastructure
#
network security
Gaps are starting to appear in perimeter defences, which can be exploited by hackers or malware to steal information and personal data.