Keysight Technologies, Inc. - Experts & Thought Leaders

Latest Keysight Technologies, Inc. news & announcements

Fortinet validates FortiGate 700G with BreakingPoint

Keysight Technologies, Inc. announces that Fortinet chose the Keysight BreakingPoint QuickTest network application and security test tool to validate SSL deep packet inspection performance capabilities and security efficacy of its FortiGate 700G series next-generation firewall (NGFW). BreakingPoint QuickTest is Keysight’s turn-key performance and security validation solution with self-stabilising, goal-seeking algorithms that quickly assess the performance and security efficacy of a variety of network infrastructures. Enterprise networks Enterprise networks and systems face a constant onslaught of cyberattacks Enterprise networks and systems face a constant onslaught of cyberattacks, including malware, vulnerabilities, and evasions. These attacks are taking a toll, as 67% of enterprises report suffering a breach in the past two years, while breach-related lawsuits have risen 500% in the last four years. Fortinet developed the FortiGate 700G series NGFW to help protect enterprise edge and distributed enterprise networks from these ever-increasing cybersecurity threats, while continuing to process legitimate customer-driven traffic that is vital to their core business. The FortiGate 700G is powered by Fortinet’s proprietary Network Processor 7 (NP7), Security Processor 5 (SP5) ASIC, and FortiOS, Fortinet’s unified operating system. Security test solution Requiring an application and security test solution that delivers real-world network traffic performance, relevant and reliable security assessment, repeatable results, and fast time-to-insight, Fortinet turned to Keysight’s BreakingPoint QuickTest network applications and security test tool. Using BreakingPoint QuickTest, Fortinet validated the network performance and cybersecurity capabilities of the FortiGate 700G NGFW using: Simplified Test Setup and Execution: Pre-defined performance and security assessment suites, along with easy, click-to-configure network configuration, allow users to set up complex tests in minutes. Reduced Test Durations: Self-stabilising, goal-seeking algorithms accelerate the test process and shorten the overall time-to-insight. Scalable HTTP and HTTPS Traffic Generation: Supports all RFC 9411 tests used by NetSecOPEN, an industry consortium that develops open standards for network security testing. This includes the 7.7 HTTPS throughput test, allowing Fortinet to quickly assess that the FortiGate 700G NGFW’s SSL Deep Inspection engine can support up to 14 Gbps of inspected HTTPS traffic. NetSecOPEN Security Efficacy Tests: BreakingPoint QuickTest supports the full suite of NetSecOPEN security efficacy tests, including malware, vulnerabilities, and evasions. This ensures the FortiGate 700G capabilities are validated with relevant, repeatable, and widely accepted industry standard test methodologies and content. Robust Reporting and Real-time Metrics: Live test feedback and clear, actionable reports showed that the FortiGate 700G successfully blocked 3,838 of the 3,930 malware samples, 1,708 of the 1,711 CVE threats, and stopped 100% of evasions, earning a grade “A” across all security tests. FortiGate 700G series Nirav Shah, Senior Vice President, Products and Solutions, Fortinet, said: “The FortiGate 700G series next-generation firewall combines cutting-edge artificial intelligence and machine learning with the port density and application throughput enterprises need, delivering comprehensive threat protection at any scale.” “Keysight's intuitive BreakingPoint QuickTest application and security test tool made our validation process easy. It provided clear and definitive results that the FortiGate 700G series NGFW equips organisations with the performance and advanced network security capabilities required to stay ahead of current and emerging cyberthreats.” Landscape of cyber threats Ram Periakaruppan, Vice President and General Manager, Keysight Network Test and Security Solutions, said: “The landscape of cyber threats is constantly evolving, so enterprises must be vigilant in adapting their network defences, while also continuing to meet their business objectives.” “Keysight's network application and security test solutions help alleviate the pressure these demands place on network equipment manufacturers by providing an easy-to-use package with pre-defined performance and security tests, innovative goal-seeking algorithms, and continuously updated benchmarking content, ensuring solutions meet rigorous industry requirements.”

Unveiling TLS exploit: Keysight leads security innovation

Keysight’s Application and Threat Intelligence (ATI) research team has uncovered a novel Transport Layer Security (TLS) handshake exploit that uses protocol-compliant behaviour to evade traditional network defenses. This newly discovered covert channel allows attackers to manipulate TLS handshake packets by simply rearranging parameter settings, without injecting malicious code, making detection by firewalls and intrusion prevention systems nearly impossible. By leveraging the flexible, permutation-friendly structure of TLS Client Hello packets, attackers can exfiltrate data or establish command and control (C2) communications, all while remaining invisible to most security tools. Exploiting encryption protocols like TLS Adversaries are exploiting the very design flexibility of widely used encryption protocols like TLS This finding highlights how adversaries are exploiting the very design flexibility of widely used encryption protocols like TLS. “The discovery of this novel covert channel that leverages legitimate TLS protocol behaviours for malicious purposes is a game changer,” said Ram Periakaruppan, Vice President and General Manager of Network Test & Security Solutions at Keysight.   “It helps shift the balance of power back to cyber-defenders.” Robust testing The average breach costs $4.88 million and takes over 250 days to contain The prevalence of TLS encryption in nearly every internet-connected system makes this exploit especially dangerous. According to IBM’s 2024 Cost of a Data Breach Report, the average breach costs $4.88 million and takes over 250 days to contain, amplifying the need for early detection and robust testing. This isn’t just another update, it’s a vital breakthrough. At the recent Silicon Valley Cybersecurity Conference, Keysight presented its findings, offering the first opportunity for the security community to learn about this previously unknown class of threats. The presentation earned the Best Paper Award, underscoring its significance as a major advancement in cybersecurity research. Security innovation With this discovery, Keysight continues to lead the charge in security innovation, helping enterprises, service providers, and network equipment manufacturers confidently validate that their infrastructure is protected against even the most evasive and cutting-edge threats. To help organisations proactively mitigate this unprecedented threat, Keysight has integrated the TLS covert channel exploit into the latest ATI update of its network application and security test solutions. This enables organisations to: Emulate the TLS exploit in a controlled lab environment Validate whether their defenses can detect and block the attack Measure performance impacts of mitigation strategies, before deploying them in production “Cybersecurity is a constant race to stop new and emerging attacks while also maintaining the network performance that users demand,” said Periakaruppan. “Our ATI research team worked tirelessly to uncover this covert exploit. By quickly integrating it into our products, we are empowering our customers to proactively test their systems’ ability to both defend against this threat, and maintain system performance, before attackers can gain widespread traction.” 

Keysight accredited by EPI for security evaluations

Keysight’s Riscure Security Solutions has been accredited by the European Payments Initiative (EPI) to conduct security evaluations for Payment Service Providers (PSPs), including both acceptor and consumer evaluations. The device security research lab’s accreditation marks an expansion of Keysight’s EPI certification services, which enable a review of the full range of EPI certification and approval objects, including: EPI Standalone Wallet EPI Digital Wallet Applications embedded in the Payment Service Provider’s (PSP) own Wallet EPI PSP Evaluations (acceptor and consumer) Security requirements “With this accreditation, we’re able to support even more companies in securing their payment solutions,” said Pascal van Gimst, VP of Sales and Business Development at Keysight. “We continue to help our clients navigate security requirements confidently, so that they can focus on building great products and delivering the best experience to their customers.” What is EPI? The goal of the EPI is to develop a comprehensive digital wallet based on the instant payment scheme The EPI is an initiative formed by 16 European banks and financial service providers to build a new digital wallet and a unified account-to-account solution for Europe. The solution aims to establish a new standard in payment methods across Europe, benefiting consumers and merchants across all retail transactions, whether in-store, online, or person-to-person (P2P). The goal of the EPI is to develop a comprehensive digital wallet based on the instant payment scheme, as defined by the European Payments Council (EPC). Digital wallets support various transactions between merchants and individuals, and aim to provide robust security and immediacy through a user-friendly interface. The EPI initiative aligns with Europe’s move towards instant payments and is a response to calls from European authorities for the development of an independent, alternative payment system based on instant payment schemes. Keysight helps customers navigate security requirements Keysight’s expertise in payment security enables vendors to efficiently navigate certification and strengthen the security of their payment solutions. This enables vendors to demonstrate compliance with strict security requirements covering cryptographic protection, secure authentication, and transaction integrity.