Keysight provides testing, visualization and security solutions to secure applications on physical and virtual networks. Enterprise companies and service providers around the world use Keysight to verify their designs, optimize performance and ensure the security of their networks.
In a digital landscape that never sleeps, visibility is the foundation of security and performance. While traditional monitoring solutions rely on data packets to function, you simply cannot secure what you cannot see, and modern, distributed network topologies are often full of blind spots. Keysight visibility tools deploy across on-premises data centers, cloud-based hypervisors, and Software-as-a-Service (SaaS) applications to capture, aggregate, and filter every packet before it reaches your monitoring stack. As a Keysight partner, amasol brings decades of experience in designing complex visibility architectures for Europe’s most demanding IT environments. We don’t just provide hardware, we ensure your visibility layer is resilient, optimized, and perfectly integrated into your existing infrastructure. By eliminating the “noise” and focusing on actionable data, we help your organization shift from reactive troubleshooting to proactive network assurance.
Validate designs with high-accuracy testing across all development stages.
Streamline workflows and automate testing to launch faster.
Monitor endpoints across your entire IT environment.
Proactively validate your network performance through synthetic monitoring. Move beyond reactive troubleshooting and start fixing issues before the first ticket is raised. Read more
Eliminate blind spots in your public, private, and hybrid cloud environments. CloudLens provides packet level visibility into East-West traffic that traditional tools often miss. Read more
Ensure 100% uptime by monitoring the heartbeat of your applications. The switch automatically reroutes traffic in nanoseconds if a tool fail or need maintenance. Patch, update, and reboot your security stack without ever taking your applications offline. Read more
Optimize your monitoring efficiency with an intelligent traffic controller for your data center. Using FPGA hardware acceleration, it filters, deduplicates, and load balances traffic at line rate speeds. Read more
Hawkeye proactively simulates real-world traffic to identify problems before they cause costly downtime.
Hawkeye is the ideal tool for validating complex network deployments such as SD-WAN, before and after you go live.
With a suite of physical, virtual, and cloud-based endpoints, you can track performance from your data center to your network's edge.
Hawkeye shows you every step traffic takes on and off your network. This enables you to troubleshoot faster by quickly pinpointing faulty nodes.
Take control of network performance with synthetic NPM based on real-world application traffic simulation. Keysight Hawkeye measures user experience in real time, conducts distributed tests across on-premise or remote infrastructure, and identifies issues proactively with automated interval testing. With Hawkeye, you can verify fixes instantly and track network trends based on time-of-day and day-of-week traffic and behavior. Consultants at amasol handle the strategic placement of performance endpoints across your entire infrastructure. We ensure your test simulations will accurately reflect your business priorities. We also help translate complex data into clear and actionable insights. With amasol as your partner, you have a strategic partner that will provide ongoing expertise you need to make the right decisions and stay ahead of network issues.
Public clouds offer elasticity, scalability, and cost savings, but a lack of packet data can make it difficult to prevent performance problems or secure vulnerable blind spots. When visibility matters most, CloudLens gives you complete access to packet data in your public cloud.
Private clouds give your users faster access to applications and services. However, without access to inter-VM traffic, your security, APM, and NPM tools are not getting a holistic view. No matter your hypervisor, CloudLens makes it easy to gain packet-level visibility in your private cloud.
A mix of public and private clouds is versatile, however many solutions are unable to capture packets in hybrid environments without complex and costly workarounds. When you need a seamless, stress-free solution, CloudLens gives you visibility without the headaches.
CloudLens is Keysight’s platform for public, private, and hybrid cloud visibility. It enables packet capture, filtering, and analysis to provide dynamic network intelligence. CloudLens helps organization reduce risk by capturing cloud-based packet data, improve security and performance with actionable intelligence, and increase efficiency with intelligence filtering and load balancing. When network security and performance matter most, organizations trust CloudLens to shed light on their most vulnerable blind spots. When you partner with amasol, we will manage the deployment of the CloudLens sensors and configure the automated scaling logic, ensuring that your visibility layer is platform agnostic and perfectly integrated.
Inline tool risk is a problem. Networks face a continuously evolving barrage of security threats. Directly deploying inline security tools can create a line of defense, but these tools can also result in single points of failure. Even a potent mix of security and analytics tools can lead to risks as regular rebooting, maintenance, and upgrades increase the chances of costly network outages. And in the event an inline tool becomes unavailable, it can completely bring down the network link, significantly compromising network uptime and disrupting business continuity.
Provide failsafe, inline protection for networks of any size. These switches safeguard a network with automated failover protection, preventing temporary tool outages from escalating into costly network outages. Deploying bypass switches between inline network devices and security tools provides a reliable separation point between the network and security layers. This allows your network and security tools to support and protect your business without the risk of network interruptions. In addition, these bypass switches allow multiple security tools to process traffic from a single network link.
Keysight offers a range of different Bypass Switches which are suitable for a range of different deployment scenarios. We are leaders in supporting "High Availability" (HA) capabilities that allow multiple tools to be deployed either in ACTIVE-ACTIVE (serial) or ACTIVE-STANDBY deployments. Our leading web based User Interface allows complex HA deployments to be configured quickly without the errors that less sophisticated interfaces can easily result in.
Bypass switches are network hardware devices that act as a failsafe mechanism for inline network devices. This means they’re directly within the path of incoming network traffic. In the case of maintenance, service disruptions, or network outages, bypass switches automatically redirect traffic to maintain the network’s core functionality. You get the freedom to update, patch, and experiment without every showing a 404 error message or website is under maintenance to your customers. Even if the update is schedule and you’ve informed your customers. People expect seamless experience on your applications. In addition, bypass switches can also mirror network traffic by sending packets directly to monitoring tools or to network packet brokers for de-duplication and distribution. When you purchase through amasol, our experts handle the full physical installation and logic configuration. We ensure the heartbeat intervals and failover triggers are perfectly calibrated to your unique environment.
Quickly and easily connect taps and SPANs, apply filters, deduplicate, decrypt and forward traffic to the right tools with intuitive drag and drop GUI. Keysight patented dynamic filter compiler makes quick work of the complexity of overlapping filters. Other solutions often require complex and hard-to-manage REGEX and other command-line exercises. The Keysight GUI helps speed operations and eliminate errors.
You deploy network packet brokers to provide visibility into network traffic to avoid blind spots. If your packet broker drops packets, you're creating blind spots that can interfere with network analytics or worse, impact security. Keysight network packet brokers are built with a system architecture that enables line rate performance with no dropped traffic or packet loss.
"Do what you can in hardware. Do what you must in software". This old adage about system design remains true today. Keysight network packet brokers use FPGA based hardware acceleration to ensure line rate performance and no dropped packet even when features and filters are turned on.
Keysight Vision Series Network Packet Brokers are high-performance hardware appliances that act as an intelligent traffic controller for your data center and hybrid environments. By leveraging FPGA-accelerated hardware, these brokers perform critical tasks such as deduplication, traffic aggregation, and line-rate filtering without dropping a single packet. This ensures that each of your security and monitoring tools receives exactly the data it needs to function, preventing tool overload and extending the lifespan of your existing infrastructure. At amasol, our consultants work closely with your team to architect a visibility fabric that understands your specific business priorities. We handle the complex logic of configuring PacketStack and AppStack features, ensuring your Network Packet Broker is tuned to prioritize the traffic that matters most to your operations. With amasol as your partner, we ensure your visibility architecture is designed correctly from day one, giving you the clear, actionable data required to maintain a secure and performant network.
You can leave us your details and we will get back to you, for an initial non-obligatory first contact.
Dynatrace’s comprehensive support for modern cloud, on-premise, and hybrid environments also ensures scalability and long-term adaptability. The result is a more reliable, cost-effective, and easier-to-manage observability solution compared to fragmented systems or less integrated deployments.
85% of technology leaders say the number of tools, platforms, dashboards, and applications adds to the complexity of managing a multicloud environment. amasol simplifies IT operations, enhances performance, and drives seamless business continuity with our unified observability solutions.
Dynatrace provides valuable insights into your IT processes. amasol connects the dots between your business requirements and IT processes.
Good day,
thank you for registering for the Workbench | Threat detection with AI-based behaviour analysis.
Here is the most important information:
When: Tuesday, 30th of September 2025 | 10 a.m. – 11 a.m.
Where: Online via Zoom.
We look forward to your participation and to interesting discussions and presentations on the topic of Detectability.
Kind regards
Laura Ilgner
You will receive a reminder email from us one week before the event.
Good day,
thank you for registering for the DX NetOps User Group from amasol.
Here is the most important information:
When: Thursday, 9 October 2025 | 9:45 a.m. – 5:00 p.m.
Where: MEZZANIN Meetings & Events by Zeitgeist Vienna near Vienna Central Station
Here you will find information on the location and how to get there.
We look forward to your participation and to interesting discussions and presentations on the topic of Broadcom.
Kind regards
Laura Ilgner
You will receive a reminder email from us one week before the event.
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.