amasol

Minimize disruptions with Keysight

Keysight provides testing, visualization and security solutions to secure applications on physical and virtual networks. Enterprise companies and service providers around the world use Keysight to verify their designs, optimize performance and ensure the security of their networks.

Proactive monitoring for a reactive world

In a digital landscape that never sleeps, visibility is the foundation of security and performance. While traditional monitoring solutions rely on data packets to function, you simply cannot secure what you cannot see, and modern, distributed network topologies are often full of blind spots. Keysight visibility tools deploy across on-premises data centers, cloud-based hypervisors, and Software-as-a-Service (SaaS) applications to capture, aggregate, and filter every packet before it reaches your monitoring stack. As a Keysight partner, amasol brings decades of experience in designing complex visibility architectures for Europe’s most demanding IT environments. We don’t just provide hardware, we ensure your visibility layer is resilient, optimized, and perfectly integrated into your existing infrastructure. By eliminating the “noise” and focusing on actionable data, we help your organization shift from reactive troubleshooting to proactive network assurance.

Key benefits

Precision That Performs

Validate designs with high-accuracy testing across all development stages.

Accelerated Time-to-Market

Streamline workflows and automate testing to launch faster.

Cybersecurity Confidence

Monitor endpoints across your entire IT environment.

Hawkeye

Proactively validate your network performance through synthetic monitoring. Move beyond reactive troubleshooting and start fixing issues before the first ticket is raised. Read more

CloudLens

Eliminate blind spots in your public, private, and hybrid cloud environments. CloudLens provides packet level visibility into East-West traffic that traditional tools often miss. Read more

Bypass Switch

Ensure 100% uptime by monitoring the heartbeat of your applications. The switch automatically reroutes traffic in nanoseconds if a tool fail or need maintenance. Patch, update, and reboot your security stack without ever taking your applications offline. Read more

Network Packet Broker

Optimize your monitoring efficiency with an intelligent traffic controller for your data center. Using FPGA hardware acceleration, it filters, deduplicates, and load balances traffic at line rate speeds. Read more

Keysight at its core

Quality of Service (QOS) monitoring

Hawkeye proactively simulates real-world traffic to identify problems before they cause costly downtime.

Deployment validation

Hawkeye is the ideal tool for validating complex network deployments such as SD-WAN, before and after you go live.

Distributed monitoring

With a suite of physical, virtual, and cloud-based endpoints, you can track performance from your data center to your network's edge.

Path discovery

Hawkeye shows you every step traffic takes on and off your network. This enables you to troubleshoot faster by quickly pinpointing faulty nodes.

Hawkeye | deep synthetic insights for a shallow monitoring world

Take control of network performance with synthetic NPM based on real-world application traffic simulation. Keysight Hawkeye measures user experience in real time, conducts distributed tests across on-premise or remote infrastructure, and identifies issues proactively with automated interval testing. With Hawkeye, you can verify fixes instantly and track network trends based on time-of-day and day-of-week traffic and behavior. Consultants at amasol handle the strategic placement of performance endpoints across your entire infrastructure. We ensure your test simulations will accurately reflect your business priorities. We also help translate complex data into clear and actionable insights. With amasol as your partner, you have a strategic partner that will provide ongoing expertise you need to make the right decisions and stay ahead of network issues. 

Packet level visibility into your public clouds

Public clouds offer elasticity, scalability, and cost savings, but a lack of packet data can make it difficult to prevent performance problems or secure vulnerable blind spots. When visibility matters most, CloudLens gives you complete access to packet data in your public cloud.

Maximum flexibility for private cloud visibility

Private clouds give your users faster access to applications and services. However, without access to inter-VM traffic, your security, APM, and NPM tools are not getting a holistic view. No matter your hypervisor, CloudLens makes it easy to gain packet-level visibility in your private cloud.

Complete visibility for hybrid cloud environments

A mix of public and private clouds is versatile, however many solutions are unable to capture packets in hybrid environments without complex and costly workarounds. When you need a seamless, stress-free solution, CloudLens gives you visibility without the headaches.

CloudLens | total packet visibility for a borderless network

CloudLens is Keysight’s platform for public, private, and hybrid cloud visibility. It enables packet capture, filtering, and analysis to provide dynamic network intelligence. CloudLens helps organization reduce risk by capturing cloud-based packet data, improve security and performance with actionable intelligence, and increase efficiency with intelligence filtering and load balancing. When network security and performance matter most, organizations trust CloudLens to shed light on their most vulnerable blind spots. When you partner with amasol, we will manage the deployment of the CloudLens sensors and configure the automated scaling logic, ensuring that your visibility layer is platform agnostic and perfectly integrated.

Network uptime

Inline tool risk is a problem. Networks face a continuously evolving barrage of security threats. Directly deploying inline security tools can create a line of defense, but these tools can also result in single points of failure. Even a potent mix of security and analytics tools can lead to risks as regular rebooting, maintenance, and upgrades increase the chances of costly network outages. And in the event an inline tool becomes unavailable, it can completely bring down the network link, significantly compromising network uptime and disrupting business continuity.

Failsafe protection

Provide failsafe, inline protection for networks of any size. These switches safeguard a network with automated failover protection, preventing temporary tool outages from escalating into costly network outages. Deploying bypass switches between inline network devices and security tools provides a reliable separation point between the network and security layers. This allows your network and security tools to support and protect your business without the risk of network interruptions. In addition, these bypass switches allow multiple security tools to process traffic from a single network link.

High availability

Keysight offers a range of different Bypass Switches which are suitable for a range of different deployment scenarios. We are leaders in supporting "High Availability" (HA) capabilities that allow multiple tools to be deployed either in ACTIVE-ACTIVE (serial) or ACTIVE-STANDBY deployments. Our leading web based User Interface allows complex HA deployments to be configured quickly without the errors that less sophisticated interfaces can easily result in.

Bypass Switch | the ultimate fail safe for your mission critical links

Bypass switches are network hardware devices that act as a failsafe mechanism for inline network devices. This means they’re directly within the path of incoming network traffic. In the case of maintenance, service disruptions, or network outages, bypass switches automatically redirect traffic to maintain the network’s core functionality. You get the freedom to update, patch, and experiment without every showing a 404 error message or website is under maintenance to your customers. Even if the update is schedule and you’ve informed your customers. People expect seamless experience on your applications. In addition, bypass switches can also mirror network traffic by sending packets directly to monitoring tools or to network packet brokers for de-duplication and distribution. When you purchase through amasol, our experts handle the full physical installation and logic configuration. We ensure the heartbeat intervals and failover triggers are perfectly calibrated to your unique environment. 

Ease of use matters

Quickly and easily connect taps and SPANs, apply filters, deduplicate, decrypt and forward traffic to the right tools with intuitive drag and drop GUI. Keysight patented dynamic filter compiler makes quick work of the complexity of overlapping filters. Other solutions often require complex and hard-to-manage REGEX and other command-line exercises. The Keysight GUI helps speed operations and eliminate errors.

Packet loss matters

You deploy network packet brokers to provide visibility into network traffic to avoid blind spots. If your packet broker drops packets, you're creating blind spots that can interfere with network analytics or worse, impact security. Keysight network packet brokers are built with a system architecture that enables line rate performance with no dropped traffic or packet loss.

Performance matters

"Do what you can in hardware. Do what you must in software". This old adage about system design remains true today. Keysight network packet brokers use FPGA based hardware acceleration to ensure line rate performance and no dropped packet even when features and filters are turned on.

Network Packet Broker | the right data, to the right tool, at the right time

Keysight Vision Series Network Packet Brokers are high-performance hardware appliances that act as an intelligent traffic controller for your data center and hybrid environments. By leveraging FPGA-accelerated hardware, these brokers perform critical tasks such as deduplication, traffic aggregation, and line-rate filtering without dropping a single packet. This ensures that each of your security and monitoring tools receives exactly the data it needs to function, preventing tool overload and extending the lifespan of your existing infrastructure. At amasol, our consultants work closely with your team to architect a visibility fabric that understands your specific business priorities. We handle the complex logic of configuring PacketStack and AppStack features, ensuring your Network Packet Broker is tuned to prioritize the traffic that matters most to your operations. With amasol as your partner, we ensure your visibility architecture is designed correctly from day one, giving you the clear, actionable data required to maintain a secure and performant network.

Get more information on Keysight

You can leave us your details and we will get back to you, for an initial non-obligatory first contact.

[contact-form-7 id="e19fffc" title="Contact Form"]
amasol miniature world with 2 dies on 4 to represent the 4 Abilities of Operational Excellence, two cows and miniature people

Our expertise

Benefit from over 25 years of deep expertise and high-quality service delivery across our key areas

amasol miniature world with a floppy disk and minaiture people. Including a banner with the amasol logo and a banner with the word blog

Resource center

Search through our library of resources for inspiration on how amasol has helped other customers to power their experience business.

amasol miniature world with a robot and miniature people which represent amasol

Why amasol

We aim to increase agility, increase the value proposition and improve the efficiency of IT and thus increase business success.

amasol miniature world with a multifunctional tool and a black board saying events

Our events

From expert discussions to hands-on workshops, we connect strategy with technology.

Discover more

Banner for Customer Success Stories, with a container ship and DB Schenkers Logo on top

Schenker relies on Dynatrace and amasol for user experience monitoring and application performance management in the air and sea freight sector

Dynatrace’s comprehensive support for modern cloud, on-premise, and hybrid environments also ensures scalability and long-term adaptability. The result is a more reliable, cost-effective, and easier-to-manage observability solution compared to fragmented systems or less integrated deployments.

From Observability to Sustainability and Green IT

Dynatrace & amasol: Stronger together

85% of technology leaders say the number of tools, platforms, dashboards, and applications adds to the complexity of managing a multicloud environment. amasol simplifies IT operations, enhances performance, and drives seamless business continuity with our unified observability solutions.

Dynatrace & amasol: Stronger together

Dynatrace provides valuable insights into your IT processes. amasol connects the dots between your business requirements and IT processes.

Successful registration to our Exeon Workbench

Good day,

thank you for registering for the Workbench | Threat detection with AI-based behaviour analysis.

Here is the most important information:

When: Tuesday, 30th of September 2025 | 10 a.m. – 11 a.m.
Where: Online via Zoom.

We look forward to your participation and to interesting discussions and presentations on the topic of Detectability.

Kind regards
Laura Ilgner

You will receive a reminder email from us one week before the event.

Successful registration to the DX NetOps Usergroup in Vienna

Good day,

thank you for registering for the DX NetOps User Group from amasol.

Here is the most important information:

When: Thursday, 9 October 2025 | 9:45 a.m. – 5:00 p.m.
Where: MEZZANIN Meetings & Events by Zeitgeist Vienna near Vienna Central Station
Here you will find information on the location and how to get there.

We look forward to your participation and to interesting discussions and presentations on the topic of Broadcom.

Kind regards
Laura Ilgner

You will receive a reminder email from us one week before the event.

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.