Skip to main content

Keysight Introduces CyPerf

Keysight Technologies announced new cloud-native distributed network performance and security test software – CyPerf – which helps organizations characterize user experience and validate the performance limits of hybrid networks, security devices and services for confident rollouts.

New technologies such as SD-WAN, multi-cloud architectures and software as a service (SaaS) applications evolve network and security architectures to a distributed, hybrid model. As more users, devices, applications, services and data reside outside of an organization, IT teams need to measure the performance and security of networks and application services. As a result, network and security operations share the objective of guaranteeing a well-performing and secure network.

Built using a light-weight, software agent-based architecture, Keysight's CyPerf software is easy to deploy and operate in lab networks, sandbox environments and hybrid production networks. CyPerf offers:

- CyPerf's web-based GUI helps users visualize and interact with various network elements that are critical to simulating a network in action.

- A holistic approach for realistic pre- and post-deployment testing in distributed environments.

- Insights into the end user experience, security posture and performance bottlenecks while under controllable, realistic load conditions.

- Real-world results by simultaneously generating legitimate traffic mixes and malicious activities that can transverse a complex distributed network consisting of proxies, software-defined wide area networking (SD-WAN), transport layer security (TLS) inspection, elastic load balancers (ELBs), and web application firewalls (WAF).

- A proactive, continuous data-driven approach that IT network operators can utilize to validate and analyze changes in user experience, performance and security compared with previously established baselines.

- Network and security operations teams the ability to find the balance between the digital user experience and security in their organizations.

- Network security tool vendors the ability to realistically replicate their customers' environments to accelerate the time-to-market of their solutions and services.

"As more users, devices, applications, services and data move to the network edge, a new approach is needed to validate performance and security," said Ram Periakaruppan, VP and GM, at Keysight Network Applications & Security Group. "CyPerf can be deployed by enterprises and network security vendors to fine-tune the balance between digital user experience and security in a dynamic hybrid environment that consists of third-party cloud providers and network connectivity. Performance and security are only as good as the weakest part of a network, and CyPerf identifies those weaknesses with a view into the full application delivery path in hybrid networks."

The Latest

In APMdigest's 2026 Observability Predictions Series, industry experts offer predictions on how Observability and related technologies will evolve and impact business in 2025. Part 6 covers OpenTelemetry ...

In APMdigest's 2026 Observability Predictions Series, industry experts offer predictions on how Observability and related technologies will evolve and impact business in 2025. Part 5 covers APM and infrastructure monitoring ...

AI continues to be the top story across the industry, but a big test is coming up as retailers make the final preparations before the holiday season starts. Will new AI powered features help load up Santa's sleigh this year? Or are early adopters in for unpleasant surprises in the form of unexpected high costs, poor performance, or even service outages? ...

In APMdigest's 2026 Observability Predictions Series, industry experts offer predictions on how Observability and related technologies will evolve and impact business in 2025. Part 4 covers user experience, digital performance, website performance and ITSM ...

In APMdigest's 2026 Observability Predictions Series, industry experts offer predictions on how Observability and related technologies will evolve and impact business in 2025. Part 3 covers more predictions about Observability ...

In APMdigest's 2026 Observability Predictions Series, industry experts offer predictions on how Observability and related technologies will evolve and impact business in 2025. Part 2 covers predictions about Observability and AIOps ...

The Holiday Season means it is time for APMdigest's annual list of predictions, covering Observability and other IT performance topics. Industry experts — from analysts and consultants to the top vendors — offer thoughtful, insightful, and often controversial predictions on how Observability, AIOps, APM and related technologies will evolve and impact business in 2026 ...

IT organizations are preparing for 2026 with increased expectations around modernization, cloud maturity, and data readiness. At the same time, many teams continue to operate with limited staffing and are trying to maintain complex environments with small internal groups. These conditions are creating a distinct set of priorities for the year ahead. The DataStrike 2026 Data Infrastructure Survey Report, based on responses from nearly 280 IT leaders across industries, points to five trends that are shaping data infrastructure planning for 2026 ...

Developers building AI applications are not just looking for fault patterns after deployment; they must detect issues quickly during development and have the ability to prevent issues after going live. Unfortunately, traditional observability tools can no longer meet the needs of AI-driven enterprise application development. AI-powered detection and auto-remediation tools designed to keep pace with rapid development are now emerging to proactively manage performance and prevent downtime ...

Every few years, the cybersecurity industry adopts a new buzzword. "Zero Trust" has endured longer than most — and for good reason. Its promise is simple: trust nothing by default, verify everything continuously. Yet many organizations still hesitate to implement Zero Trust Network Access (ZTNA). The problem isn't that ZTNA doesn't work. It's that it's often misunderstood ...

Keysight Introduces CyPerf

Keysight Technologies announced new cloud-native distributed network performance and security test software – CyPerf – which helps organizations characterize user experience and validate the performance limits of hybrid networks, security devices and services for confident rollouts.

New technologies such as SD-WAN, multi-cloud architectures and software as a service (SaaS) applications evolve network and security architectures to a distributed, hybrid model. As more users, devices, applications, services and data reside outside of an organization, IT teams need to measure the performance and security of networks and application services. As a result, network and security operations share the objective of guaranteeing a well-performing and secure network.

Built using a light-weight, software agent-based architecture, Keysight's CyPerf software is easy to deploy and operate in lab networks, sandbox environments and hybrid production networks. CyPerf offers:

- CyPerf's web-based GUI helps users visualize and interact with various network elements that are critical to simulating a network in action.

- A holistic approach for realistic pre- and post-deployment testing in distributed environments.

- Insights into the end user experience, security posture and performance bottlenecks while under controllable, realistic load conditions.

- Real-world results by simultaneously generating legitimate traffic mixes and malicious activities that can transverse a complex distributed network consisting of proxies, software-defined wide area networking (SD-WAN), transport layer security (TLS) inspection, elastic load balancers (ELBs), and web application firewalls (WAF).

- A proactive, continuous data-driven approach that IT network operators can utilize to validate and analyze changes in user experience, performance and security compared with previously established baselines.

- Network and security operations teams the ability to find the balance between the digital user experience and security in their organizations.

- Network security tool vendors the ability to realistically replicate their customers' environments to accelerate the time-to-market of their solutions and services.

"As more users, devices, applications, services and data move to the network edge, a new approach is needed to validate performance and security," said Ram Periakaruppan, VP and GM, at Keysight Network Applications & Security Group. "CyPerf can be deployed by enterprises and network security vendors to fine-tune the balance between digital user experience and security in a dynamic hybrid environment that consists of third-party cloud providers and network connectivity. Performance and security are only as good as the weakest part of a network, and CyPerf identifies those weaknesses with a view into the full application delivery path in hybrid networks."

The Latest

In APMdigest's 2026 Observability Predictions Series, industry experts offer predictions on how Observability and related technologies will evolve and impact business in 2025. Part 6 covers OpenTelemetry ...

In APMdigest's 2026 Observability Predictions Series, industry experts offer predictions on how Observability and related technologies will evolve and impact business in 2025. Part 5 covers APM and infrastructure monitoring ...

AI continues to be the top story across the industry, but a big test is coming up as retailers make the final preparations before the holiday season starts. Will new AI powered features help load up Santa's sleigh this year? Or are early adopters in for unpleasant surprises in the form of unexpected high costs, poor performance, or even service outages? ...

In APMdigest's 2026 Observability Predictions Series, industry experts offer predictions on how Observability and related technologies will evolve and impact business in 2025. Part 4 covers user experience, digital performance, website performance and ITSM ...

In APMdigest's 2026 Observability Predictions Series, industry experts offer predictions on how Observability and related technologies will evolve and impact business in 2025. Part 3 covers more predictions about Observability ...

In APMdigest's 2026 Observability Predictions Series, industry experts offer predictions on how Observability and related technologies will evolve and impact business in 2025. Part 2 covers predictions about Observability and AIOps ...

The Holiday Season means it is time for APMdigest's annual list of predictions, covering Observability and other IT performance topics. Industry experts — from analysts and consultants to the top vendors — offer thoughtful, insightful, and often controversial predictions on how Observability, AIOps, APM and related technologies will evolve and impact business in 2026 ...

IT organizations are preparing for 2026 with increased expectations around modernization, cloud maturity, and data readiness. At the same time, many teams continue to operate with limited staffing and are trying to maintain complex environments with small internal groups. These conditions are creating a distinct set of priorities for the year ahead. The DataStrike 2026 Data Infrastructure Survey Report, based on responses from nearly 280 IT leaders across industries, points to five trends that are shaping data infrastructure planning for 2026 ...

Developers building AI applications are not just looking for fault patterns after deployment; they must detect issues quickly during development and have the ability to prevent issues after going live. Unfortunately, traditional observability tools can no longer meet the needs of AI-driven enterprise application development. AI-powered detection and auto-remediation tools designed to keep pace with rapid development are now emerging to proactively manage performance and prevent downtime ...

Every few years, the cybersecurity industry adopts a new buzzword. "Zero Trust" has endured longer than most — and for good reason. Its promise is simple: trust nothing by default, verify everything continuously. Yet many organizations still hesitate to implement Zero Trust Network Access (ZTNA). The problem isn't that ZTNA doesn't work. It's that it's often misunderstood ...