Skip to main content

Keysight Technologies Expands Innovate Anywhere Program to IT Community

Keysight Technologies has extended the company’s Innovate Anywhere program in response to COVID-19, which is available through May 31, 2020, to enable IT staff to support the growing remote user community, while maintaining network availability, improving security and ensuring performance.

“As companies around the world adjust to more and more employees working remotely, IT teams have stepped up to support those remote users to ensure business continuity,” stated Mark Pierpoint, President of Network Applications & Security at Keysight Technologies. “Virtual private networks (VPNs) are critical to maintain security between users working from home and their company. Keysight is committed to helping IT groups ensure their VPNs are performing properly for all the users, while not costing more than necessary by being over-provisioned.”

■ Complimentary Secure Sockets Layer (SSL) Virtual Private Network (VPN) Check: Many VPNs use the SSL protocol to provide secure private network access from a public network. Keysight’s complimentary SSL VPN Availability Assessment is a self-service web portal that enables IT staff to check their company’s Cisco VPN gateway’s availability to accept new incoming connections. This low-impact assessment includes daily e-mail reports and proactive alerts to potential VPN gateway availability issues.

■ SSL VPN Gateway Assessment Service: A VPN infrastructure is key to business continuity, but companies scaled most of their deployments for the status quo — not the new normal. Now, business continuity depends on employees being able to work remotely. Not only does IT need to provision enough VPN capacity for a usage surge, they need to validate that the network can smoothly support critical applications at peak traffic loads.

Keysight’s test experts use an elastically scaling cloud infrastructure to simulate thousands of VPN clients connecting to the customer’s production VPN gateways during a maintenance window. The assessment provides detailed reports and metrics that enable IT to identify performance issues and optimize split tunnel policies for a better user experience by answering these critical questions:

- How many users can my VPN gateway support?
- How long does connection establishment take when a lot of users are connecting?
- How much throughput does the gateway support with lots of connected users?
- How much bandwidth per tunnel can my infrastructure sustain?

■ Complimentary Live Network Testing Trial: To support customers whose unified communications, voice and video applications are struggling to keep up with an influx of remote connections, Keysight is offering a complimentary 30-day Hawkeye Network Performance Monitoring trial to help minimize service disruptions and ensure user experience with active network monitoring.

■ Complimentary Breach and Attack Simulation Trial: Security operations teams supporting a growing remote workforce must assess how security protocols are working via the company’s VPN, given the numerous threats posed by exploitable home devices and exposure to malware. Keysight’s Threat Simulator, a breach and attack simulation platform, safely measures security risks and exposes gaps.

The Latest

According to Auvik's 2025 IT Trends Report, 60% of IT professionals feel at least moderately burned out on the job, with 43% stating that their workload is contributing to work stress. At the same time, many IT professionals are naming AI and machine learning as key areas they'd most like to upskill ...

Businesses that face downtime or outages risk financial and reputational damage, as well as reducing partner, shareholder, and customer trust. One of the major challenges that enterprises face is implementing a robust business continuity plan. What's the solution? The answer may lie in disaster recovery tactics such as truly immutable storage and regular disaster recovery testing ...

IT spending is expected to jump nearly 10% in 2025, and organizations are now facing pressure to manage costs without slowing down critical functions like observability. To meet the challenge, leaders are turning to smarter, more cost effective business strategies. Enter stage right: OpenTelemetry, the missing piece of the puzzle that is no longer just an option but rather a strategic advantage ...

Amidst the threat of cyberhacks and data breaches, companies install several security measures to keep their business safely afloat. These measures aim to protect businesses, employees, and crucial data. Yet, employees perceive them as burdensome. Frustrated with complex logins, slow access, and constant security checks, workers decide to completely bypass all security set-ups ...

Image
Cloudbrink's Personal SASE services provide last-mile acceleration and reduction in latency

In MEAN TIME TO INSIGHT Episode 13, Shamus McGillicuddy, VP of Research, Network Infrastructure and Operations, at EMA discusses hybrid multi-cloud networking strategy ... 

In high-traffic environments, the sheer volume and unpredictable nature of network incidents can quickly overwhelm even the most skilled teams, hindering their ability to react swiftly and effectively, potentially impacting service availability and overall business performance. This is where closed-loop remediation comes into the picture: an IT management concept designed to address the escalating complexity of modern networks ...

In 2025, enterprise workflows are undergoing a seismic shift. Propelled by breakthroughs in generative AI (GenAI), large language models (LLMs), and natural language processing (NLP), a new paradigm is emerging — agentic AI. This technology is not just automating tasks; it's reimagining how organizations make decisions, engage customers, and operate at scale ...

In the early days of the cloud revolution, business leaders perceived cloud services as a means of sidelining IT organizations. IT was too slow, too expensive, or incapable of supporting new technologies. With a team of developers, line of business managers could deploy new applications and services in the cloud. IT has been fighting to retake control ever since. Today, IT is back in the driver's seat, according to new research by Enterprise Management Associates (EMA) ...

In today's fast-paced and increasingly complex network environments, Network Operations Centers (NOCs) are the backbone of ensuring continuous uptime, smooth service delivery, and rapid issue resolution. However, the challenges faced by NOC teams are only growing. In a recent study, 78% state network complexity has grown significantly over the last few years while 84% regularly learn about network issues from users. It is imperative we adopt a new approach to managing today's network experiences ...

Image
Broadcom

From growing reliance on FinOps teams to the increasing attention on artificial intelligence (AI), and software licensing, the Flexera 2025 State of the Cloud Report digs into how organizations are improving cloud spend efficiency, while tackling the complexities of emerging technologies ...

Keysight Technologies Expands Innovate Anywhere Program to IT Community

Keysight Technologies has extended the company’s Innovate Anywhere program in response to COVID-19, which is available through May 31, 2020, to enable IT staff to support the growing remote user community, while maintaining network availability, improving security and ensuring performance.

“As companies around the world adjust to more and more employees working remotely, IT teams have stepped up to support those remote users to ensure business continuity,” stated Mark Pierpoint, President of Network Applications & Security at Keysight Technologies. “Virtual private networks (VPNs) are critical to maintain security between users working from home and their company. Keysight is committed to helping IT groups ensure their VPNs are performing properly for all the users, while not costing more than necessary by being over-provisioned.”

■ Complimentary Secure Sockets Layer (SSL) Virtual Private Network (VPN) Check: Many VPNs use the SSL protocol to provide secure private network access from a public network. Keysight’s complimentary SSL VPN Availability Assessment is a self-service web portal that enables IT staff to check their company’s Cisco VPN gateway’s availability to accept new incoming connections. This low-impact assessment includes daily e-mail reports and proactive alerts to potential VPN gateway availability issues.

■ SSL VPN Gateway Assessment Service: A VPN infrastructure is key to business continuity, but companies scaled most of their deployments for the status quo — not the new normal. Now, business continuity depends on employees being able to work remotely. Not only does IT need to provision enough VPN capacity for a usage surge, they need to validate that the network can smoothly support critical applications at peak traffic loads.

Keysight’s test experts use an elastically scaling cloud infrastructure to simulate thousands of VPN clients connecting to the customer’s production VPN gateways during a maintenance window. The assessment provides detailed reports and metrics that enable IT to identify performance issues and optimize split tunnel policies for a better user experience by answering these critical questions:

- How many users can my VPN gateway support?
- How long does connection establishment take when a lot of users are connecting?
- How much throughput does the gateway support with lots of connected users?
- How much bandwidth per tunnel can my infrastructure sustain?

■ Complimentary Live Network Testing Trial: To support customers whose unified communications, voice and video applications are struggling to keep up with an influx of remote connections, Keysight is offering a complimentary 30-day Hawkeye Network Performance Monitoring trial to help minimize service disruptions and ensure user experience with active network monitoring.

■ Complimentary Breach and Attack Simulation Trial: Security operations teams supporting a growing remote workforce must assess how security protocols are working via the company’s VPN, given the numerous threats posed by exploitable home devices and exposure to malware. Keysight’s Threat Simulator, a breach and attack simulation platform, safely measures security risks and exposes gaps.

The Latest

According to Auvik's 2025 IT Trends Report, 60% of IT professionals feel at least moderately burned out on the job, with 43% stating that their workload is contributing to work stress. At the same time, many IT professionals are naming AI and machine learning as key areas they'd most like to upskill ...

Businesses that face downtime or outages risk financial and reputational damage, as well as reducing partner, shareholder, and customer trust. One of the major challenges that enterprises face is implementing a robust business continuity plan. What's the solution? The answer may lie in disaster recovery tactics such as truly immutable storage and regular disaster recovery testing ...

IT spending is expected to jump nearly 10% in 2025, and organizations are now facing pressure to manage costs without slowing down critical functions like observability. To meet the challenge, leaders are turning to smarter, more cost effective business strategies. Enter stage right: OpenTelemetry, the missing piece of the puzzle that is no longer just an option but rather a strategic advantage ...

Amidst the threat of cyberhacks and data breaches, companies install several security measures to keep their business safely afloat. These measures aim to protect businesses, employees, and crucial data. Yet, employees perceive them as burdensome. Frustrated with complex logins, slow access, and constant security checks, workers decide to completely bypass all security set-ups ...

Image
Cloudbrink's Personal SASE services provide last-mile acceleration and reduction in latency

In MEAN TIME TO INSIGHT Episode 13, Shamus McGillicuddy, VP of Research, Network Infrastructure and Operations, at EMA discusses hybrid multi-cloud networking strategy ... 

In high-traffic environments, the sheer volume and unpredictable nature of network incidents can quickly overwhelm even the most skilled teams, hindering their ability to react swiftly and effectively, potentially impacting service availability and overall business performance. This is where closed-loop remediation comes into the picture: an IT management concept designed to address the escalating complexity of modern networks ...

In 2025, enterprise workflows are undergoing a seismic shift. Propelled by breakthroughs in generative AI (GenAI), large language models (LLMs), and natural language processing (NLP), a new paradigm is emerging — agentic AI. This technology is not just automating tasks; it's reimagining how organizations make decisions, engage customers, and operate at scale ...

In the early days of the cloud revolution, business leaders perceived cloud services as a means of sidelining IT organizations. IT was too slow, too expensive, or incapable of supporting new technologies. With a team of developers, line of business managers could deploy new applications and services in the cloud. IT has been fighting to retake control ever since. Today, IT is back in the driver's seat, according to new research by Enterprise Management Associates (EMA) ...

In today's fast-paced and increasingly complex network environments, Network Operations Centers (NOCs) are the backbone of ensuring continuous uptime, smooth service delivery, and rapid issue resolution. However, the challenges faced by NOC teams are only growing. In a recent study, 78% state network complexity has grown significantly over the last few years while 84% regularly learn about network issues from users. It is imperative we adopt a new approach to managing today's network experiences ...

Image
Broadcom

From growing reliance on FinOps teams to the increasing attention on artificial intelligence (AI), and software licensing, the Flexera 2025 State of the Cloud Report digs into how organizations are improving cloud spend efficiency, while tackling the complexities of emerging technologies ...