What Can You Do to Strengthen Your Network?
In general, businesses should consider initiating their own cyber security defense plan, like what MSN reporting suggests here. Besides just shoring up defenses, businesses should start looking for signs of intrusions and setting up a way to create "manual overrides" to security threats and intrusions. After that, it falls upon the business to determine what can and should be done.
What can you do, specifically, to strengthen your network?
The question always gets down to what specifically can you do to strengthen your cyber security architecture. Unfortunately, a lot of this is security architecture dependent and industry risk dependent. However, here are some simple but effective general guidelines.
Start immediately with a simple plan that works with whatever other architecture guidelines you follow (NIST Cybersecurity framework, MITRE ATT&CK framework, Defense in Depth, Zero Trust, etc.). Effective simplicity is one of the best techniques because it ends up being an approach that you can maintain. Elaborate, complicated architectures that are designed to "kick the crap" out of security attacks can become too high maintenance and too complicated to stay effective long term.
Here is one, simple 3-point plan to consider:
Prevention – Reduce as many threats entering the network as possible
Detection – Find and quickly remediate intrusions that are discovered within the network and implement a cyber resilience plan for successful breaches
Vigilance – Whether you trust or don't trust, periodically test your defenses to ensure that they are actually detecting and blocking threats
Let's look at the suggestion above in more detail.
Step 1 is about preventing as many intrusions into the network as possible by implementing a solid security architecture. Simply put — do what you can to stop the threat(s). This due diligence will be worth its weight in gold in stopping a significant number of attacks. Inline security solutions using an IPS, WAF, TLS decryption, and other technology are good examples of a best practice.
Step 2 is about finding intrusions on your network and quickly remediating those issues. The faster you find the problem, the safer you are. This is extremely important as the Ponemon Institute finds every year that it takes way too long to identify breaches on the network. For example, the 2021 Ponemon Institute Cost of A Data Breach report found that it took businesses an average of 287 days to identify and contain a data breach. This gives bad actors way too much time to do their dirty work.
Step 3 is about periodically validating that your security architecture is working as designed. This means using a breach and attack simulation (BAS) solution to safely and repeatedly check your defenses against real-world threats. Your network changes throughout the year. You need to know that a new hardware upgrade, software upgrade, or configuration change didn't break anything.
The following is a detailed list of actions that security engineers and architects can take based upon each of those three steps.
Preventative Actions:
1. Review your cybersecurity and infrastructure plan, including your escalation plan. Are they up to date? Who has what specific responsibilities? Are there any disconnects between systems?
2. Ask senior management and the CISO to send reminders to employees about potential phishing attempts intended to capture credentials and gain access to the network. The first key message to employees – "never click on the links." The second message to employees is that they will not be punished for reporting phishing or mistakes that could have led to a compromise. Maybe they should even get a reward? The key point here it that people make mistakes. If they think they will get reprimanded if they report their mistakes, then they never report anything which actually does more potential harm to the network by obscuring important facts.
3. Make data backups now and continuously. These backups need to be stored on removal memory, i.e. store the data "off network" so that it can’t be contaminated. You want the data and system configurations handy though. If ransomware or other malware is encountered that you can't get rid of, you want to be able to go "nuclear" and simply wipe the whole system clean and then reinstall programs and data. Some data will be lost with this approach but if the backups are frequent enough, this could be a very fast and minimally painful remedy.
4. Implement upgrades and patches. If you are new to the organization, test your security tools in a lab using a security tester like BreakingPoint to make sure (or determine) that your equipment is fortified to handle known security threats like DDoS, malware, virus', etc. You want to look for architecture vulnerabilities and to determine the EXACT performance (not data sheet specs) for the types of equipment (firewalls, IDS, IPS, WAF, Threat Intelligence gateways, etc.) within your network.
5. Upgrade/optimize your inline security protection solutions. Deploying security tools like an IPS, WAF, etc. are very effective at preventing threats from entering your network. However, you need External bypass switches and network packet brokers (NPBs) to optimize those solutions. Bypass switches allow you to maintain business continuity for your network and inline security tools. NPBs further enhance this solution with n+1 load balancing, internal data packet decryption, and enhanced data manipulation.
6. Install threat intelligence gateways to augment firewalls. Firewalls are good, but it's even better to have help from purpose-built devices that that provide rapidly updated whitelist or blacklist IP addresses and geographies for you. The purpose here is to remove the human element and use automation to limit threats. Since attacks are constantly "popping up" from new IP addresses, most security engineers simply cannot keep up with the list on a daily basis. Automated threat intelligence gateways fill this need.
7. Deploy TLS 1.3 decryption. It is estimated that 70% or more of security threats are now hidden within encrypted data packets. If you can't look into the packets, you're flying blind – so expect a horrific "crash and burn" scenario without TLS decryption functions.
Detection
1. While log files can be erased by certain types of malware — packets don't lie. Network packet brokers should be used to capture the right security data and relay it to out-of-band security tools, like an IDS, DLP, etc. These tools can then analyze those packets to find indicators of compromise.
2. Deploy threat hunting tools, like Viavi, to actively look for on-premises and cloud-based threats. For any threat hunting tool to be effective, it needs to see ALL of the data. Seeing part(s) of the data isn't good enough. The tool needs everything, or it will miss intrusions. This is why you need to deploy data taps at critical points across your network and then use a network packet broker to aggregate and filter that content so that your security tools (IDS, DLP, SIEM, etc.) get exactly the right data at the right time to properly flag any anomalies or suspicious activities. The tap and packet broker combination gives you the visibility you need so that your security tools are as successful as possible. At the same time, you also need lossless visibility. You don't want to add just any packet broker. Depending upon their design, some packet brokers (like ones that use CPUs to process advance functionality) drop packets — i.e., they "lose" data. This means that you could be missing up to 60% of your security threats and not even know it. So, packet broker selection is critical.
3. Use application intelligence to look for indicators of compromise. Flow data can provide some general information, but you still need a deeper look. You can get this from application data, i.e., Layer 7 packet data. This allows you to see how applications in general are flowing across your network and also if there are specific problems. For instance, is there a DNS or NDP packet flood attack happening? You can literally see it by using a network packet broker that supports this application intelligence function.
4. Reinforce your cyber resilience plan. If you do get attacked, how do you get back to normal operations as fast as possible? There are many possible components to this plan. Here are a few to consider:
a) Optimize network continuity with external bypass switches and heartbeat messaging. These devices can be set to Fail Open or Fail Closed, as you choose. The reason for an external bypass is that if you have to completely replace a security tool (and you are relying upon an internal bypass), then your network goes down during the changeout.
b) Inline and out-of-band network packet brokers using load balancing and n+1 survivability allow you to maintain operations during "impaired" network situations. The right choice of packet brokers also provides reversion capability which means that they can automatically sense when out of service security tools become operational again (i.e., if a security tool does a reboot and comes back online). This provides a "self-healing" component to your security architecture.
c) Inline packet brokers with Active-Active processors provide enhanced business continuity without loss of data. Active-Standby solutions will lose data while the standby processor comes online.
d) The ability to completely simulate the attack in your labs to validate any fixes is especially important. This is where you need a security threat generator, like BreakingPoint, to faithfully reproduce the security attack in your lab so that you can determine whether your security fix actually works. The last thing you want is to shoot yourself in the foot by rolling out a security fix that doesn’t work. This could lead to another successful attack/breach and be a career limiting event for yourself.
e) Something else to consider is network packet brokers that support integration to SIEMs. This allows your network to support automation to collect data faster and thwart security attacks as fast as possible.
f) Start conducting cyber range training exercises so that you can recognize and respond to attacks faster. It's one thing to suspect that a certain type of attack has happened, or is happening, and another to be able to "see" the indicators of different types of attacks in real-time. Practice seeing these attacks in a cyber range is critically important. While you may not be able to tell a Petya attack from Ryuk, you can at least narrow down your search to the fact that it is probably a ransomware attack and proceed forward with that information.
Vigilance
1. Every network has security issues. You know it, I know it, and hackers know it. You need to hack yourself before someone else does it. A straightforward and fairly easy way of doing this is perform breach and attack simulations (BAS). Pen testing is only good for a point in time and is typically expensive. You need repeated and continuous evaluations.
2. You need to be able answer executive questions as well as your own. For instance, what systems were updated recently (both hardware and software)? Did these new changes adversely affect the security architecture? You need to know and just not assume that everything is okay. Once a few weeks or months have passed, new weaknesses will probably exist. There is a reason why businesses continue to be hacked, even though those businesses invest in security solutions.
3. If you're a new security engineer to a business, BAS gives you a way to check and see if routine patch maintenance has been conducted. For instance, maybe a patch wasn't applied or was applied incorrectly. How would you know unless you performed an extremely time-consuming audit of all of your equipment?
4. And crucially, were the right fixes applied if a vulnerability was found? For these reasons and more, you need to use a BAS solution to determine the current strength of your defenses.
Hopefully this blog has given you some things to consider. If you're looking for help, KEYSIGHT offers many solutions that could be beneficial like:
Security threat testers like BreakingPoint
Network taps like Flex Taps
External bypass switches like iBypass
Network packet brokers like Vision ONE
Application intelligence like AppStack
Threat Intelligence gateways like ThreatARMOR
TLS decryption like SecureStack
Breach and Attack simulators like Threat Simulator
See for yourself how Keysight's solutions can significantly enhance your company's security architecture.
- |
- +1 赞 0
- 收藏
- 评论 0
本文由董慧转载自Keysight,原文标题为:What Security Threats Should North American Businesses Expect Due to the Current Geopolitical Uncertainty,本站所有转载文章系出于传递更多信息之目的,且明确注明来源,不希望被转载的媒体或个人可与我们联系,我们将立即进行删除处理。
相关研发服务和供应服务
相关推荐
Keysight(是德科技)网络可视化产品选型指南
目录- Network Visibility Products Introduction Network Packet Brokers Bypass Switche Network Taps Cloud Visibility Visibility Central Management
型号- VISION EDGE OS,VISION 400,VISION EDGE 1S,VISION EDGE 10S,VISION EDGE 100,IBYPASS 100G,VISION 7816,VISION EDGE 40,VISION X,VISION ONE,VISION E400S,IBYPASS VHD,IBYPASS DUO,TRADEVISION,IBYPASS 4 COPPER
Keysight‘s Taps, Bypass Switches, And NPBs Can Help Find Your Security Vulnerability Before Hackers
Keysight Technologies has taps, bypass switches, and NPBs provide the visibility and confidence you need that you are seeing EVERYTHING in your network. They can find your security vulnerability before hackers find it for you.
原厂动态 发布时间 : 2022-01-22
How Can I Reduce Network Security Risk – Part 2
This blog Keysight examines step 2 of reducing network security risk. Step 2 is about finding intrusions on your network and quickly remediating those issues.
原厂动态 发布时间 : 2022-03-03
Keysight‘s TAPS and NPBs Meet NERC CIP Standards For Threat Visibility&Detection for Critical Infrastructure
The NERC Critical Infrastructure Protection (CIP) standards include regulatory elements that make collecting and archiving network traffic more important. This article introduces NERC CIP standards for threat visibility&detection for critical infrastructure.
原厂动态 发布时间 : 2022-03-26
Keysight Unveils Industrial Visibility Solutions for Electric Utility Market to Meet Monitoring Requirements Worldwide
Keysight announced a new series of Industrial Visibility solutions, which include a network packet broker and taps that enable electric utilities to meet North American Electric Reliability Corporation (NERC) Critical Infrastructure Protection (CIP) monitoring requirements.
原厂动态 发布时间 : 2021-10-25
Keysight’s on-premises solutions as well as cloud-based solutions in RSA 2022
At the Keysight booth, we were showing off our on-premises solutions as well as our cloud-based solutions. These solutions included: Flex taps and iBypass switches, inline and out-of-band Vision ONE network packet brokers, Threat Simulator, and CyPerf.
应用方案 发布时间 : 2022-06-20
Keysight(是德科技)测试仪器分销产品选型指南(英文)
目录- BenchVue Control and Analysis Software RF Bench and Handheld Instruments Handheld Spectrum Analyzers FieldFox Handheld Analyzers Spectrum Analyzers, Signal Analyzer Audio Analyzer and Signal Generator Power Sensors and Power Meters RF and Microwave Test Accessories Vector Network Analyzers and ECal Modules Essential Bench Oscilloscopes, Applications, and Probes Digital Multimeters Function/Arbitrary Waveform Generators Data Acquisition/Switch Units USB Products and Connectivity Frequency Counters/Timers Power Supplies Bench Power Supplies System Power Supplies Precision Power Supplies System Power Supplies(continued) DC Power Analyzer, SMUs, and DC Electronic Loads AC Power Sources LCR Meters Handheld Instruments
型号- U8480,B2911A,U1272A,N8926A,34460A,N7040A,U8000,N9340B,53140,N5742A,N5766A,34905A,N9918A,N6735B,N8480,N5743A,N5767A,N1914A,3024T,3012T,U1273A,34904A,N6746B,N6734B,U3800,U1282A,N8948A,34470A,N7042A,N1913A,N5744A,N5768A,34903A,N8924A,N9916A,N9928A,34939A,N6701C,N8949A,U1271A,N8925A,N8937A,N7041A,N1912A,N9000B,N5745A,N5769A,N2819A,3022T,3034T,N6700C,34902A,N9917A,34938A,N6736B,U1600,8491A,DSOX1102G,DSOX1102A,N9320B,P-SERIES,33509B,N7020A,N1911A,N9344C,N5746A,N3302A,N2818A,34901A,34937A,U1701B,82357B,U1273AX,U2802A,N5181B,N2142A,U1281A,B2902A,4024A,N5747A,N3303A,8490G,N2805A,3032T,N6702C,U1700,N6705C,N8928A,N9342C,33519B,B2901A,N3304A,N5748A,34947A,N2804A,N8929A,N5171B,N9343C,N2140A,X-SERIES,B2912A,N3305A,U8903B,N5749A,4022A,34934A,4034A,34946A,8480D,3054T,U2702A,N3306A,U1733C,U1210,U2300,N5700,34945A,3458A,TU1453A,U2701A,B2962A,1146B,N3307A,1147B,N7026A,33600A,33612A,B2961A,N9322C,N9310A,U1731C,2002A,53200,2014A,3104T,U1610A,U2723A,33611A,2004A,U1732C,J7205A,34942A,U3606B,53210A,J7205B,U2722A,N1810UL,33622A,3102T,34941A,N8760A,2012A,2024A,U2500,U1620A,33512B,33500B,33621A,N1810TL,3004A,N6700,N6705,N8761A,N2821A,33511B,N3300,4104A,2022A,N2820A,U2600,33510B,33522B,3014T,N2843A,E36100B,33521B,N9962A,87106D,AC6804B,E4982A,DAQM905A,34950A-34959A,N6750,N9950A,N8740A,E36103B,U2020,EDUX1002A,N9951A,33520B,N7007A,83050A,N2962A,53131A,P9243A,E4981A,U2741A,34972A,E36102B,J7211B,J7211A,J7211C,E36320A,N8741A,AC6802B,DAQM903A,U1270,N9960A,E36311A,N8762A,E36105B,N6781A,U2000,E3641A,EDUX1002G,N2863B,AC6803B,DAQM904A,N8900,U1280,84904L,U2751A,34970A,N9961A,B2900,E36104B,E3640A,AC6800B,N2862B,6002A,E3600,E-SERIES,E36313A,DAQM900A,U1250,U5850,N8756A,N8732A,N8950A,AC6801B,10070D,DAQM902A,U2761A,34980A,E36300A,E36312A,N6782A,DAQM901A,E36106B,53220A,N8757A,87222D,N8733A,N8951A,87222E,N9952A,87104D,P9242A,E4980A,6004A,53132A,N6785A,N6773A,U1452A,B2980A,N6761A,N8754A,N8742A,P9241A,N2871A,53230A,N8700,N4985A-S50,U1240,N6784A,E4981A-001,E4981A-002,N8755A,U1453A,N8731A,N2870A,8495D,N2797A,87405B,N2894A,N5770A,8495B,87405C,34420A,E3647A,10833F,34921A-25A,10833G,10833A,10833B,4154A,10833C,10833D,N6775A,U1450A,N8736A,N6763A,U1232A,N8954A,N6751A,N8930A,N7550,N9923A,N2796A,N9935A,N2893A,N5771A,E36100,E3646A,6811C,N4985A-S30,4032A,N8737A,N6786A,N6774A,N8943A,N6762A,E5063A,10834A,N8955A,U1451A,8494G,N8931A,E3634A,U1233A,3052T,N2783B,P9371A,N2795A,N5772A,6813C,E3649A,6800C,6812C,N6753A,N8758A,U1460A,N6741B,U1242C,N8734A,U1242B,N8952A,N6777A,N8940A,N6765A,P9370A,N2891A,N2782B,EPM SERIES,53181A,N5761A,34931A-33A,34465A,E3648A,4054A,N8759A,N6764A,U1231A,U1461A,N6752A,E9320,83020A,N8735A,N8941A,N6776A,N2793A,DAQ970A,N2890A,L2060,N2781B,U1240C,N9914A,82350C,N5750A,N5762A,U2063,E5810B,N8934A,N6743B,N9926A,P1912A,N8946A,N6731B,N9938A,U1252B,E3643A,E3631A,N6755A,14585A,N2792A,N2780B,U1241C,N5763A,E4980AL,N5751A,E36300,E9300,N8923A,N9915A,N8935A,N6742B,N9927A,E3630A,U1241B,4052A,U1253B,E3642A,N6766A,34908A,N6754A,N2791A,N9912A,N8738A,N9936A,U1190,U2040,N5752A,N5764A,34450A,DAQM907A,N8932A,N8944A,34907A,N8920A,E3645A,N6745B,E3633A,N6733B,L2050,N2790A,U1251B,N8739A,N9913A,N9925A,N5741A,DAQM908A,N5765A,34461A,U2053,N8945A,N6732B,N9937A,N8957A,N8921A,E3632A,E3620A,N6756A,E3644A,N6744B
Keysight(是德科技)电源产品选型指南(中文)
目录- BenchVue软件 电源产品 系统直流电源和台式直流电源 直流电源输出电压和电流一览表 直流电源 直流电子负载 交流电源 专用电源产品 已停产的直流电源及其替代产品
型号- B2911B,B2911A,N8926A,U8000,N5742A,N5766A,6632B,6644A,BV0003B,N6977A,N6735B,N6953A,6800C 系列,N5743A,N5767A,N1275A,6621A,6633B,6645A,N6780 系列,EL30000系列,N6976A,N6746B,B1506A,N6952A,N6734B,U8031A,N8948A,N5744A,N5768A,N1274A,E4361A,N3300A,6622A,6634B,66332A,N8924A,66102A,6600 系列,B1505A,N6701C,66000,N8949A,N8925A,N8937A,6624A,N5745A,N5769A,E4360A,6611C,N3301A,N1273A,6623A,B2901BL,N6700C,66101A,U8000 系列,N6736B,N6954A,E36100A 系列,N6700A,E5263A,6625A,6612C,N5746A,N3302A,N1272A,66104A,N1260A,U8032A,66321D,66321B,B2902B,B2902A,6626A,N5747A,N3303A,6613C,PA2203A,66103A,BV0012B,N1271A,N6702C,6060 系列,6060B,N6705C,B2901B,N8928A,6800B 系列,N7900 系列,B2901A,6627A,EL30000,N3304A,6614C,N5748A,6600,E4360,66106A,N6783A-BAT,N8929A,B2900A,B2912B,E5262A,6628A,B2912A,N3305A,N5749A,66311B,PV8922A,66105A,U8001A,E4368A,N3306A,E4356A,N5700,6672A,B1511B,6684A,PV8921A,RP7935A,CX3322A,BV9210B,RP7945A,RP7933A,B2962A,N8900 系列,N3307A,E4367A,RP7900 系列,N6900,B1510A,6673A,PV8932A,B2960,RP7946A,6620 系列,B2961B,B2961A,RP7932A,6674A,AC6906L,AC6918L,PV8931A,U2723A,U8002A,RP7943A,RP7931A,6675A,B1520A,6651A,PA2201A,U2722A,BV9201B,AC6900,N8760A,6652A,B2900A 系列,E36232A,AC6906H,66300,AC6918H,N6700,N8761A,6653A,E4362A,B1514A,6641A,E36231A,BV9211B,B2960系列,EDU36311A,N3300,B1513C,6654A,6642A,E36234A,N7900,CX3324A,667X,U2720,CX3300A,BV9200B,669X,E36200 系列,66000 系列,B1500A,6643A,B1512A,E36233A,6655A,6631B,AC6903L,668X,RP7936A,E36100B,AC6903H,E36100A,RP7962A,AC6804A,PV8900 系列,AC6804B,N8740A,E36103A,E36103B,N6791A,AC6912L,AC6912H,RP7973A,RP7961A,6035A,66309B,E36102B,E36102A,66309D,N8741A,AC6802B,RP7972A,AC6802A,E3600 系列,E36311A,N8762A,B2960 系列,E36105B,N6781A,E36105A,6690A,E3641A,RP7983A,N3300 系列,AC6803A,AC6803B,N8900,E36104B,E36104A,N6792A,E3640A,6691A,AC6800A,N6790,AC6800B,N6783A-MFG,RP7942A,E3600,6038A,N6900 系列,E36313A,6692A,N6783A,N8756A,6680A,N8732A,PV8900,N8950A,RP7941A,AC6801A,AC6801B,N6780,RP7953A,E36312A,N6782A,E36106B,E36106A,AC6900 系列,N8757A,6681A,N8733A,N8951A,RP7952A,N7971A,6682A,N6785A,N6773A,N6761A,N8754A,N8742A,RP7963A,RP7951A,N7970A,N8700,6683A,6671A,N6784A,N8755A,N8731A,N5770A,6629A,N7973A,E3647A,N6775A,N6763A,N8736A,N6751A,N8954A,N8930A,E36300 系列,E36340,6063B,E5260A,N5771A,N1259A,6812B,N7972A,E36100,E3646A,6811C,6811B,E36100 系列,N6786A,N8737A,N6774A,N6762A,N8943A,AC6800A 系列,N8955A,N8931A,E3634A,N5772A,N1258A,6813C,6813B,N7951A,6800C,E3649A,E36100B系列,6812C,6800B,AC6800B 系列,N6753A,N8758A,N6741B,N8734A,N6971A,N8952A,N6777A,N8940A,N6765A,EL30000 系列,E5270B,N5761A,N7950A,N7974A,N8700 系列,E3648A,N8759A,N6764A,N6752A,N6970A,N8735A,N8941A,N6776A,RP7982A,6030A,N5750A,N7953A,N7977A,N5762A,N1268A,N8934A,N6743B,N6731B,N8946A,N6973A,E36100B 系列,E3643A,E3631A,N6755A,14585A,CX3300A 系列,6031A,N7976A,N5763A,N5751A,E36300,N7952A,N1267A,N6972A,N8923A,N6790 系列,N8935A,N6742B,E3630A,E3642A,N6766A,N6754A,N5700 系列,N8738A,6032A,6030 系列,N5752A,N5764A,RP7900,B2910BL,N1266A,N6951A,N8932A,N8944A,N8920A,E3645A,N6745B,E3633A,N6733B,N8739A,6033A,N7954A,N5741A,N5765A,66319B,N1265A,N6950A,N8945A,N6732B,N8957A,N8921A,E3632A,E3620A,N6756A,N6974A,E3644A,N6744B,66319D
Keysight Enables First O-RAN Open Distributed Unit Fronthaul Certificate for ArrayComm through APOP
Keysight Technologies has enabled ArrayComm to obtain the first O-RAN ALLIANCE Fronthaul Certificate of Conformance for its open distributed unit (O-DU) with the Keysight Open RAN Architect (KORA) solutions. The certification was issued by the Asia & Pacific OTIC in PRC (APOP).
原厂动态 发布时间 : 2023-03-30
【选型】Keysight(是德科技)通用及基础测量仪器样本
目录- 示波器和探头 数字万用表 数字采集和开关 频率计数器、函数和任意波形发生器 电源 射频仪表
型号- U1272A,34460A,34133A,53140,N5742A,N5766A,E4980ALU-050,N2919A,N576XA,N5439A,6644A,661XC-220,54600S,34905A,3446MEMU,3000X,U2700,N674XB,34132A,34132B,53150,N5743A,53151,N5767A,661XC-OL2,664XA,3024T,N2918A,6621A,3000T,53152,6645A,N2918B,N9310A-1CM,661XC-230,U1273A,34904A,U1620,E364XA-1CM,N6746B,3000X,DSOXGPIB,N8948A,1000,34131A,DSOX4AUTO,N5744A,N5768A,N2917B,6622A,N3300A,8120-4383,TPS://WWW.SEKORM.COM/WEB/SEARCH/KEYWORDN2801A,34903A,663XB-0B3,DSOX4SENSOR,N8900A,66102A,N6701A,E5387A,66000,U1271A,N8949A,66002A 66001A,11059A,6624A,N5745A,668XA-0B3,8120-5488,N5769A,3022T,6623A,N3301A,33500,8120-5489,34902A,66101A,N9340B-AMA,N2916B,U1600,N6700B,33509B,N7020A,6625A,DSOXLAN,4000X,N3302A,N5746A,8120-5413,8120-6502,N2874,8120-5412,N574XA,U1604A,8120-6980,34901A,34925A,66104A,8120-6507,N2915A,8120-5414,U2802A,66321D,N9310A-1HB,DSO1072B,66321B,663XB-760,B2902A,4000X,6626A,N3303A,N5747A,8120-5421,N2829A,N2862,600,66103A,34924A,N2805A,N6702A,N6705B,N9330B,668XA-909,B2901A,6627A,668XA-908,N3304A,U1602A,N2828A,N5748A,34923A,34947A,8120-8705,N2804A,66106A,6628A,891A,669XA-0L2,N3305A,N5749A,34922A,E5805A,34946A,N2827A,60XX-220,N2803A,66105A,U8001A,DSOX4EMBD,N2849A-68701,1000B,3000,1000A,TPS://WWW.SEKORM.COM/WEB/SEARCH/KEYWORD54600S,N3306A,DSOX4MASK,U1600A,U1210,N2791A/N2891A,34921A,6575A,34945A,1158A,6551A,6684A,3446SECU,N2826A,5485X,N2802A,E363XA-0L2,1134A,DSO1052B,34172B,N3307A,657XA,U3400,6552A,N2801A,60XX-240,5462X,N2825A,34171B,N9340B-ADP,DSOX2000,33612A,33503A,1131A,N9310A,663XB-8ZJ,U1731B,6553A,N2800A,N3300A-UJ1,N2739A,N2848A,N2824A,8121-0695,8121-0694,DSOX2APPBNDL,33611A,B2960A,U8002A,E4980ALU-201,N33313A,1132A,DSOX2AUTO,8120-43831,U3606A,U1732B,6554A,34942A,681XB-1CP,BNC,1157A,U3606B,5464X,681XB-1CM,2000 X,N2738A,DSOX3ADVMATH,6551,N9340B-ABJ,8120-5490,8121-1330,N9340B-ABA,2000X,8121-1331,655XA,8120-8767,53100,8120-8768,34941A,6555A,34832A,663XB-120,N2822A,N9340B-AB2,3000TX,33500B,N5,N9330B-ADP,1130A,U2600A,N9340B-PA3,DSOX3EMBD,200,6641A,669XA-0B3,1131.,N2821A,DSOX3MASK,4000 X,5000,N3300,AC6800,6642A,34830A,N7900,N2820A,N2759A,33522A,33522B,1180CZ,663XB-100,DSOX4COMP,N9310A-1T,N9340B-TG3,6643A,N2867A,N2843A,U1401B,N9340B-INM,AC6804A,DSOX3AUDIO,34840B,DSOX4FLEX,669XA-908,669XA-909,N2733A,N2866B,N2733B,3458A-002,DSOX2EMBD,3458A-001,E2695A,DSO1012A,34972A,N9310A-1TC,60001,N2889A,N2756A,6063B-020,N2732A,AC6802A,6000A,U1270,6000X,DSO1014A,U1880A,N9340B-TAD,90000 X,663XB-020,N2779A,N2888A,6000L,DSOX3COMP,E2697A,N2863B,AC6803A,U2751A,34970A,L4411A,6000X,34401A,N9330B-202,N9330B-203,U1881A,N9330B-201,N2778A,N2887A,54826,8120-1689,7000,N2862B,E4980A-710,668XA-208,54830,U1250,DSOXEDK,6571A,681XB-208,N875XA,N2777A,6680A,N8756A,N8732A,N8950A,TPS://WWW.SEKORM.COM/WEB/SEARCH/KEYWORD1163A,E3610-17A,AC6801A,DSOX3FLEX,681XB-200,10070D,N2885A,N2752A,N5440A,E3451B,81180A,U2531A,54600,6572A,E4980AL-100,6681A,N8757A,N2776A,U3402A,N8733A,53147A,8120-2956,N8951A,681XB-230,N2884A,N2751A,N7971A,DSO1102B,6641A-45A,DSOX2COMP,64997A,6682A,U1230,6573A,U3401A,N6773A,B2980A,N8754A,N7970A,N2750A,DCA-J 86100D,53230A,6813B-019,N5442A,6631BA,8120,6574A,6683A,54620,U1240,N8755A,5484X,N8731A,N2797A,N5770A,N2882A,N873XA,N5443A,34420A,N7973A,10073D,DSOXDVM,E2678A,80000,N28,N6775A,N8736A,8120-2104,N6751A,N8954A,DSOX4PWR,N2881A,E2655C,6063B,N2796A,N5444A,P66321B,N5771A,6812B,N7972A,10074D,E2679A,N5468A,N9340B-XDM,6811B,11053A,9000X,N8737A,N6774A,DSOX3MSO,N8955A,E3634A,N2771B,N2880A,DSOXPERFMSO,N6450,N2795A,N5772A,N5469A,9000,6813B,N5445A,U2356A,8121-6203,N7951A,N6459,N6753A,N8758A,U1242B,N6971A,N8734A,33220A,N8952A,N6777A,681XB-026,53181A,681XB-020,U2331A,661XC-760,10072A,N7950A,60XX-0B3,U2355A,N7974A,DSOX4AUDIO,34465A,E5813A,34138A,E4356A-909,E4356A-908,U1461A,N8759A,N6752A,N6970A,N8735A,N677XB,N6776A,N2793A,N9340B-IBC,U1591A,11058A,U2354A,N5750A,N7953A,N7977A,N5447A,N5423A,E5810B,E5810A,N6731B,N6973A,N2914,DSOX4APPBNDL,661XC-0B3,E3631A,N6755A,N2792A,DSOX3VID,E2675A,DSOX2MASKM,34330A,U2353A,N7976A,E4980AL,N5751A,N9340B-1TC,N5448A,N5424A,N7952A,34136A,DSOX2SEM,N3331A,N6972A,U1241B,E3630A,DSOX4AERO,34908A,N6754A,E2676A,N2791A,N9330B-1TC,N8738A,10075A,U2352A,N5752A,N5425A,U1452AT,3000T X,N577XA,N5449A,DSOXT3DVMCTR,7000B,TPS://WWW.SEKORM.COM/WEB/SEARCH/KEYWORD10076C\,3000 X,U2700 USB,U1177A,N6951A,E363XA-1CM,N2836A-68701,34907A,E3633A,N6733B,E2677A,N9310A-001,N2790A,N675XA,66000A-909,E4980A-301,N8739A,66000A-908,N7954A,10076B,34134A,10076C,U2351A,N5426A,34461A,66319B,8120-4753,N6732B,N6950A,N8957A,E3632A,34906A,N6756A,N6974A,66319D,N9330B-BCG,B2911A,N2111A,8120-5570,N9340B,E2614A,1161A,DSOX3AERO,6632B,8120-5572,N1022B,8120-5573,33250A,54830S,8120-5337,N6735B,N6977A,N6711A,N6953A,661XC-100,1162A,E2615A,6633B,34945EXT,N9330B-BAT,3012T,8120-5342,N6710B,66002A,N6976A,90000Z,N6734B,N6952A,DSOX4WAVEGEN2,90000X,U8031A,663XB-1CM,90000Q,663XB-1CP,34470A,E2616A,N575XA,6634B,8120-6204,661XC-120,90000A,66332A,6651A-55,DSOX2WAVEGEN,34939A,N673XB,1132,1131,82351A,1160A,N2819A,6611C,3034T,N5406A,8120-8871,66000A-0L2,34938A,N6736B,N6954A,N6712A,90000,E5396A,N9320B,6612C,N2818A,E
【选型】Keysight(是德科技)Agilent 射频和微波开关选型指南
目录- 射频和微波开关产品系列 机电同轴开关特性 机电开关产品性能 机电开关的典型应用 固态开关特性 低视频泄漏和超快的稳定时间 固态开关典型应用 驱动开关 11713B/C衰减器/开关驱动器典型应用 选择正确的开关技术 机电(EM)开关选型表 机电开关订货信息 衰减器/开关驱动器订货信息
型号- 87106D,N1812UL,8766K,87106A,87106C,87106B,11713B-401,11713B-801,U9397C,U9397A,L7104D,11713B-001,L7104B,34945A,L7104C,L7104A,L4490A,70611A,8765F,11764-60004,8765D,U1810TL,P9400,8765B,87606B,8765C,8765A,P9404,P9402,L4445A,11713C-601,11713C-201,11713-60043,11713-60042,11713-60044,11713-60047,5061-0969,8768M,8768K,U9397,11713B-908,11713B-909,P9400C,P9400A,11713B-501,11761-60001,U9400C,U9400A,11713B-101,SP2T,87204C,8767M,8767K,87204B,87204A,87406B,5061-9496,11713C-701,11713C-301,L4491A,N181X,11713B,5063-9212,11713A,P9373C,11713C,N1810UL,8762F,8762C,P9397A,8762A,8762B,P9402C,8764CL,SPDT,P9402A,11713B-601,11713B-201,FET SPDT,85331,5064-7848,SP4T,85332,85331B,8120-2703,87130A,N1810TL,87206B,8769M,87206A,8761B,8769K,87206C,11713C-001,8761A,34980A,11713C-801,L7222C,11713C-401,87106,SP3T,L7206C,87104,L7206A,L7206B,87222D,87222C,87222,87222E,85332B,87104C,87104B,87104D,87104A,8764C,11713B-301,8764A,8764B,P9404C,11713B-701,P9404A,L7106D,L7106B,L7106C,L7106A,SP6T,8762,N1811TL,L7104,8765,L7106,5063-9240,8763,8764,8763B,8763C,11713C-101,8763A,L7222,11713C-501,L7204C,L7204A,U9400,11713C-908,L7204B,11713C-909,SP5T
Keysight(是德科技)数据采集系统和开关解决方案产品选型指南
目录- DAQ970A / DAQ973A Data Acquisition System and Modules 34980A Data Acquisition System and Modules USB Data Acquisition Mainframe and Modules
型号- DAQ970A,U2354A,DAQM905A,DAQM909A,U2653A,34941A,U2300,DAQM900A,34921A,34945A,34933A,34925A,34937A,DAQ973A,U2802A,U2781A,U2353A,DAQM902A,U2652A,34980A,U2300 SERIES,34945EXT,34952A,34932A,DAQM901A,34924A,U2651A,U2352A,DAQM903A,U2356A,DAQM907A,U2600 SERIES,34951A,34931A,34923A,34947A,34959A,U2600,34939A,DAQM904A,U2331A,U2351A,DAQM908A,U2751A,U2355A,34950A,34942A,34934A,34922A,34946A,34938A
现货市场
登录 | 立即注册
提交评论