What Can You Do to Strengthen Your Network?

2022-03-08 Keysight

In general, businesses should consider initiating their own cyber security defense plan, like what MSN reporting suggests here. Besides just shoring up defenses, businesses should start looking for signs of intrusions and setting up a way to create "manual overrides" to security threats and intrusions. After that, it falls upon the business to determine what can and should be done.


What can you do, specifically, to strengthen your network?

The question always gets down to what specifically can you do to strengthen your cyber security architecture. Unfortunately, a lot of this is security architecture dependent and industry risk dependent. However, here are some simple but effective general guidelines.


Start immediately with a simple plan that works with whatever other architecture guidelines you follow (NIST Cybersecurity framework, MITRE ATT&CK framework, Defense in Depth, Zero Trust, etc.). Effective simplicity is one of the best techniques because it ends up being an approach that you can maintain. Elaborate, complicated architectures that are designed to "kick the crap" out of security attacks can become too high maintenance and too complicated to stay effective long term.


Here is one, simple 3-point plan to consider:


Prevention – Reduce as many threats entering the network as possible

Detection – Find and quickly remediate intrusions that are discovered within the network and implement a cyber resilience plan for successful breaches

Vigilance – Whether you trust or don't trust, periodically test your defenses to ensure that they are actually detecting and blocking threats


Let's look at the suggestion above in more detail.


Step 1 is about preventing as many intrusions into the network as possible by implementing a solid security architecture. Simply put — do what you can to stop the threat(s). This due diligence will be worth its weight in gold in stopping a significant number of attacks. Inline security solutions using an IPS, WAF, TLS decryption, and other technology are good examples of a best practice.


Step 2 is about finding intrusions on your network and quickly remediating those issues. The faster you find the problem, the safer you are. This is extremely important as the Ponemon Institute finds every year that it takes way too long to identify breaches on the network. For example, the 2021 Ponemon Institute Cost of A Data Breach report found that it took businesses an average of 287 days to identify and contain a data breach. This gives bad actors way too much time to do their dirty work.


Step 3 is about periodically validating that your security architecture is working as designed. This means using a breach and attack simulation (BAS) solution to safely and repeatedly check your defenses against real-world threats. Your network changes throughout the year. You need to know that a new hardware upgrade, software upgrade, or configuration change didn't break anything.


The following is a detailed list of actions that security engineers and architects can take based upon each of those three steps.


Preventative Actions:


1. Review your cybersecurity and infrastructure plan, including your escalation plan. Are they up to date? Who has what specific responsibilities? Are there any disconnects between systems?


2. Ask senior management and the CISO to send reminders to employees about potential phishing attempts intended to capture credentials and gain access to the network. The first key message to employees – "never click on the links." The second message to employees is that they will not be punished for reporting phishing or mistakes that could have led to a compromise. Maybe they should even get a reward? The key point here it that people make mistakes. If they think they will get reprimanded if they report their mistakes, then they never report anything which actually does more potential harm to the network by obscuring important facts.


3. Make data backups now and continuously. These backups need to be stored on removal memory, i.e. store the data "off network" so that it can’t be contaminated. You want the data and system configurations handy though. If ransomware or other malware is encountered that you can't get rid of, you want to be able to go "nuclear" and simply wipe the whole system clean and then reinstall programs and data. Some data will be lost with this approach but if the backups are frequent enough, this could be a very fast and minimally painful remedy.


4. Implement upgrades and patches. If you are new to the organization, test your security tools in a lab using a security tester like BreakingPoint to make sure (or determine) that your equipment is fortified to handle known security threats like DDoS, malware, virus', etc. You want to look for architecture vulnerabilities and to determine the EXACT performance (not data sheet specs) for the types of equipment (firewalls, IDS, IPS, WAF, Threat Intelligence gateways, etc.) within your network.


5. Upgrade/optimize your inline security protection solutions. Deploying security tools like an IPS, WAF, etc. are very effective at preventing threats from entering your network. However, you need External bypass switches and network packet brokers (NPBs) to optimize those solutions. Bypass switches allow you to maintain business continuity for your network and inline security tools. NPBs further enhance this solution with n+1 load balancing, internal data packet decryption, and enhanced data manipulation.


6. Install threat intelligence gateways to augment firewalls. Firewalls are good, but it's even better to have help from purpose-built devices that that provide rapidly updated whitelist or blacklist IP addresses and geographies for you. The purpose here is to remove the human element and use automation to limit threats. Since attacks are constantly "popping up" from new IP addresses, most security engineers simply cannot keep up with the list on a daily basis. Automated threat intelligence gateways fill this need.


7. Deploy TLS 1.3 decryption. It is estimated that 70% or more of security threats are now hidden within encrypted data packets. If you can't look into the packets, you're flying blind – so expect a horrific "crash and burn" scenario without TLS decryption functions.


Detection

1. While log files can be erased by certain types of malware — packets don't lie.  Network packet brokers should be used to capture the right security data and relay it to out-of-band security tools, like an IDS, DLP, etc. These tools can then analyze those packets to find indicators of compromise.


2. Deploy threat hunting tools, like Viavi, to actively look for on-premises and cloud-based threats. For any threat hunting tool to be effective, it needs to see ALL of the data. Seeing part(s) of the data isn't good enough. The tool needs everything, or it will miss intrusions. This is why you need to deploy data taps at critical points across your network and then use a network packet broker to aggregate and filter that content so that your security tools (IDS, DLP, SIEM, etc.) get exactly the right data at the right time to properly flag any anomalies or suspicious activities. The tap and packet broker combination gives you the visibility you need so that your security tools are as successful as possible. At the same time, you also need lossless visibility. You don't want to add just any packet broker. Depending upon their design, some packet brokers (like ones that use CPUs to process advance functionality) drop packets — i.e., they "lose" data. This means that you could be missing up to 60% of your security threats and not even know it. So, packet broker selection is critical.


3. Use application intelligence to look for indicators of compromise. Flow data can provide some general information, but you still need a deeper look. You can get this from application data, i.e., Layer 7 packet data. This allows you to see how applications in general are flowing across your network and also if there are specific problems. For instance, is there a DNS or NDP packet flood attack happening? You can literally see it by using a network packet broker that supports this application intelligence function.


4. Reinforce your cyber resilience plan. If you do get attacked, how do you get back to normal operations as fast as possible? There are many possible components to this plan. Here are a few to consider:


a)  Optimize network continuity with external bypass switches and heartbeat messaging. These devices can be set to Fail Open or Fail Closed, as you choose. The reason for an external bypass is that if you have to completely replace a security tool (and you are relying upon an internal bypass), then your network goes down during the changeout.


b)  Inline and out-of-band network packet brokers using load balancing and n+1 survivability allow you to maintain operations during "impaired" network situations. The right choice of packet brokers also provides reversion capability which means that they can automatically sense when out of service security tools become operational again (i.e., if a security tool does a reboot and comes back online). This provides a "self-healing" component to your security architecture.


c)  Inline packet brokers with Active-Active processors provide enhanced business continuity without loss of data. Active-Standby solutions will lose data while the standby processor comes online.


d)  The ability to completely simulate the attack in your labs to validate any fixes is especially important. This is where you need a security threat generator, like BreakingPoint, to faithfully reproduce the security attack in your lab so that you can determine whether your security fix actually works. The last thing you want is to shoot yourself in the foot by rolling out a security fix that doesn’t work. This could lead to another successful attack/breach and be a career limiting event for yourself.


e)  Something else to consider is network packet brokers that support integration to SIEMs. This allows your network to support automation to collect data faster and thwart security attacks as fast as possible.


f)   Start conducting cyber range training exercises so that you can recognize and respond to attacks faster. It's one thing to suspect that a certain type of attack has happened, or is happening, and another to be able to "see" the indicators of different types of attacks in real-time. Practice seeing these attacks in a cyber range is critically important. While you may not be able to tell a Petya attack from Ryuk, you can at least narrow down your search to the fact that it is probably a ransomware attack and proceed forward with that information.


Vigilance

1. Every network has security issues. You know it, I know it, and hackers know it. You need to hack yourself before someone else does it. A straightforward and fairly easy way of doing this is perform breach and attack simulations (BAS). Pen testing is only good for a point in time and is typically expensive. You need repeated and continuous evaluations.


2. You need to be able answer executive questions as well as your own. For instance, what systems were updated recently (both hardware and software)? Did these new changes adversely affect the security architecture? You need to know and just not assume that everything is okay. Once a few weeks or months have passed, new weaknesses will probably exist. There is a reason why businesses continue to be hacked, even though those businesses invest in security solutions.


3. If you're a new security engineer to a business, BAS gives you a way to check and see if routine patch maintenance has been conducted. For instance, maybe a patch wasn't applied or was applied incorrectly. How would you know unless you performed an extremely time-consuming audit of all of your equipment?


4. And crucially, were the right fixes applied if a vulnerability was found? For these reasons and more, you need to use a BAS solution to determine the current strength of your defenses.


Hopefully this blog has given you some things to consider. If you're looking for help, KEYSIGHT offers many solutions that could be beneficial like:

  • Security threat testers like BreakingPoint

  • Network taps like Flex Taps

  • External bypass switches like iBypass

  • Network packet brokers like Vision ONE

  • Application intelligence like AppStack

  • Threat Intelligence gateways like ThreatARMOR

  • TLS decryption like SecureStack

  • Breach and Attack simulators like Threat Simulator


See for yourself how Keysight's solutions can significantly enhance your company's security architecture.

技术资料,数据手册,3D模型库,原理图,PCB封装文件,选型指南来源平台:世强硬创平台www.sekorm.com
现货商城,价格查询,交期查询,订货,现货采购,在线购买,样品申请渠道:世强硬创平台电子商城www.sekorm.com/supply/
概念,方案,设计,选型,BOM优化,FAE技术支持,样品,加工定制,测试,量产供应服务提供:世强硬创平台www.sekorm.com
集成电路,电子元件,电子材料,电气自动化,电机,仪器全品类供应:世强硬创平台www.sekorm.com
  • +1 赞 0
  • 收藏
  • 评论 0

本文由董慧转载自Keysight,原文标题为:What Security Threats Should North American Businesses Expect Due to the Current Geopolitical Uncertainty,本站所有转载文章系出于传递更多信息之目的,且明确注明来源,不希望被转载的媒体或个人可与我们联系,我们将立即进行删除处理。

评论

   |   

提交评论

全部评论(0

暂无评论

相关推荐

Keysight(是德科技)网络可视化产品选型指南

目录- Network Visibility Products Introduction    Network Packet Brokers    Bypass Switche    Network Taps    Cloud Visibility    Visibility Central Management   

型号- VISION EDGE OS,VISION 400,VISION EDGE 1S,VISION EDGE 10S,VISION EDGE 100,IBYPASS 100G,VISION 7816,VISION EDGE 40,VISION X,VISION ONE,VISION E400S,IBYPASS VHD,IBYPASS DUO,TRADEVISION,IBYPASS 4 COPPER

选型指南  -  KEYSIGHT  - December 15, 2022 PDF 英文 下载

Federal Agency Fortifies Its Network Against Cyberattacks

型号- VISION ONE,VISION ONE SERIES

成功案例  -  KEYSIGHT  - July 30, 2020 PDF 英文 下载

Keysight‘s Taps, Bypass Switches, And NPBs Can Help Find Your Security Vulnerability Before Hackers

Keysight Technologies has taps, bypass switches, and NPBs provide the visibility and confidence you need that you are seeing EVERYTHING in your network. They can find your security vulnerability before hackers find it for you.

原厂动态    发布时间 : 2022-01-22

How Can I Reduce Network Security Risk – Part 2

This blog Keysight examines step 2 of reducing network security risk. Step 2 is about finding intrusions on your network and quickly remediating those issues.

原厂动态    发布时间 : 2022-03-03

成功案例  -  KEYSIGHT  - August 26, 2022 PDF 英文 下载

Keysight‘s TAPS and NPBs Meet NERC CIP Standards For Threat Visibility&Detection for Critical Infrastructure

The NERC Critical Infrastructure Protection (CIP) standards include regulatory elements that make collecting and archiving network traffic more important. This article introduces NERC CIP standards for threat visibility&detection for critical infrastructure.

原厂动态    发布时间 : 2022-03-26

Keysight Unveils Industrial Visibility Solutions for Electric Utility Market to Meet Monitoring Requirements Worldwide

Keysight announced a new series of Industrial Visibility solutions, which include a network packet broker and taps that enable electric utilities to meet North American Electric Reliability Corporation (NERC) Critical Infrastructure Protection (CIP) monitoring requirements.

原厂动态    发布时间 : 2021-10-25

Keysight’s on-premises solutions as well as cloud-based solutions in RSA 2022

At the Keysight booth, we were showing off our on-premises solutions as well as our cloud-based solutions. These solutions included: Flex taps and iBypass switches, inline and out-of-band Vision ONE network packet brokers, Threat Simulator, and CyPerf.

应用方案    发布时间 : 2022-06-20

Keysight(是德科技)测试仪器分销产品选型指南(英文)

目录- BenchVue Control and Analysis Software    RF Bench and Handheld Instruments    Handheld Spectrum Analyzers    FieldFox Handheld Analyzers    Spectrum Analyzers, Signal Analyzer    Audio Analyzer and Signal Generator    Power Sensors and Power Meters    RF and Microwave Test Accessories    Vector Network Analyzers and ECal Modules    Essential Bench    Oscilloscopes, Applications, and Probes    Digital Multimeters    Function/Arbitrary Waveform Generators    Data Acquisition/Switch Units    USB Products and Connectivity    Frequency Counters/Timers    Power Supplies    Bench Power Supplies    System Power Supplies    Precision Power Supplies    System Power Supplies(continued)    DC Power Analyzer, SMUs, and DC Electronic Loads    AC Power Sources    LCR Meters    Handheld Instruments   

型号- U8480,B2911A,U1272A,N8926A,34460A,N7040A,U8000,N9340B,53140,N5742A,N5766A,34905A,N9918A,N6735B,N8480,N5743A,N5767A,N1914A,3024T,3012T,U1273A,34904A,N6746B,N6734B,U3800,U1282A,N8948A,34470A,N7042A,N1913A,N5744A,N5768A,34903A,N8924A,N9916A,N9928A,34939A,N6701C,N8949A,U1271A,N8925A,N8937A,N7041A,N1912A,N9000B,N5745A,N5769A,N2819A,3022T,3034T,N6700C,34902A,N9917A,34938A,N6736B,U1600,8491A,DSOX1102G,DSOX1102A,N9320B,P-SERIES,33509B,N7020A,N1911A,N9344C,N5746A,N3302A,N2818A,34901A,34937A,U1701B,82357B,U1273AX,U2802A,N5181B,N2142A,U1281A,B2902A,4024A,N5747A,N3303A,8490G,N2805A,3032T,N6702C,U1700,N6705C,N8928A,N9342C,33519B,B2901A,N3304A,N5748A,34947A,N2804A,N8929A,N5171B,N9343C,N2140A,X-SERIES,B2912A,N3305A,U8903B,N5749A,4022A,34934A,4034A,34946A,8480D,3054T,U2702A,N3306A,U1733C,U1210,U2300,N5700,34945A,3458A,TU1453A,U2701A,B2962A,1146B,N3307A,1147B,N7026A,33600A,33612A,B2961A,N9322C,N9310A,U1731C,2002A,53200,2014A,3104T,U1610A,U2723A,33611A,2004A,U1732C,J7205A,34942A,U3606B,53210A,J7205B,U2722A,N1810UL,33622A,3102T,34941A,N8760A,2012A,2024A,U2500,U1620A,33512B,33500B,33621A,N1810TL,3004A,N6700,N6705,N8761A,N2821A,33511B,N3300,4104A,2022A,N2820A,U2600,33510B,33522B,3014T,N2843A,E36100B,33521B,N9962A,87106D,AC6804B,E4982A,DAQM905A,34950A-34959A,N6750,N9950A,N8740A,E36103B,U2020,EDUX1002A,N9951A,33520B,N7007A,83050A,N2962A,53131A,P9243A,E4981A,U2741A,34972A,E36102B,J7211B,J7211A,J7211C,E36320A,N8741A,AC6802B,DAQM903A,U1270,N9960A,E36311A,N8762A,E36105B,N6781A,U2000,E3641A,EDUX1002G,N2863B,AC6803B,DAQM904A,N8900,U1280,84904L,U2751A,34970A,N9961A,B2900,E36104B,E3640A,AC6800B,N2862B,6002A,E3600,E-SERIES,E36313A,DAQM900A,U1250,U5850,N8756A,N8732A,N8950A,AC6801B,10070D,DAQM902A,U2761A,34980A,E36300A,E36312A,N6782A,DAQM901A,E36106B,53220A,N8757A,87222D,N8733A,N8951A,87222E,N9952A,87104D,P9242A,E4980A,6004A,53132A,N6785A,N6773A,U1452A,B2980A,N6761A,N8754A,N8742A,P9241A,N2871A,53230A,N8700,N4985A-S50,U1240,N6784A,E4981A-001,E4981A-002,N8755A,U1453A,N8731A,N2870A,8495D,N2797A,87405B,N2894A,N5770A,8495B,87405C,34420A,E3647A,10833F,34921A-25A,10833G,10833A,10833B,4154A,10833C,10833D,N6775A,U1450A,N8736A,N6763A,U1232A,N8954A,N6751A,N8930A,N7550,N9923A,N2796A,N9935A,N2893A,N5771A,E36100,E3646A,6811C,N4985A-S30,4032A,N8737A,N6786A,N6774A,N8943A,N6762A,E5063A,10834A,N8955A,U1451A,8494G,N8931A,E3634A,U1233A,3052T,N2783B,P9371A,N2795A,N5772A,6813C,E3649A,6800C,6812C,N6753A,N8758A,U1460A,N6741B,U1242C,N8734A,U1242B,N8952A,N6777A,N8940A,N6765A,P9370A,N2891A,N2782B,EPM SERIES,53181A,N5761A,34931A-33A,34465A,E3648A,4054A,N8759A,N6764A,U1231A,U1461A,N6752A,E9320,83020A,N8735A,N8941A,N6776A,N2793A,DAQ970A,N2890A,L2060,N2781B,U1240C,N9914A,82350C,N5750A,N5762A,U2063,E5810B,N8934A,N6743B,N9926A,P1912A,N8946A,N6731B,N9938A,U1252B,E3643A,E3631A,N6755A,14585A,N2792A,N2780B,U1241C,N5763A,E4980AL,N5751A,E36300,E9300,N8923A,N9915A,N8935A,N6742B,N9927A,E3630A,U1241B,4052A,U1253B,E3642A,N6766A,34908A,N6754A,N2791A,N9912A,N8738A,N9936A,U1190,U2040,N5752A,N5764A,34450A,DAQM907A,N8932A,N8944A,34907A,N8920A,E3645A,N6745B,E3633A,N6733B,L2050,N2790A,U1251B,N8739A,N9913A,N9925A,N5741A,DAQM908A,N5765A,34461A,U2053,N8945A,N6732B,N9937A,N8957A,N8921A,E3632A,E3620A,N6756A,E3644A,N6744B

选型指南  -  KEYSIGHT  - November 2018 PDF 英文 下载

Keysight(是德科技)电源产品选型指南(中文)

目录- BenchVue软件    电源产品    系统直流电源和台式直流电源    直流电源输出电压和电流一览表    直流电源    直流电子负载    交流电源    专用电源产品    已停产的直流电源及其替代产品   

型号- B2911B,B2911A,N8926A,U8000,N5742A,N5766A,6632B,6644A,BV0003B,N6977A,N6735B,N6953A,6800C 系列,N5743A,N5767A,N1275A,6621A,6633B,6645A,N6780 系列,EL30000系列,N6976A,N6746B,B1506A,N6952A,N6734B,U8031A,N8948A,N5744A,N5768A,N1274A,E4361A,N3300A,6622A,6634B,66332A,N8924A,66102A,6600 系列,B1505A,N6701C,66000,N8949A,N8925A,N8937A,6624A,N5745A,N5769A,E4360A,6611C,N3301A,N1273A,6623A,B2901BL,N6700C,66101A,U8000 系列,N6736B,N6954A,E36100A 系列,N6700A,E5263A,6625A,6612C,N5746A,N3302A,N1272A,66104A,N1260A,U8032A,66321D,66321B,B2902B,B2902A,6626A,N5747A,N3303A,6613C,PA2203A,66103A,BV0012B,N1271A,N6702C,6060 系列,6060B,N6705C,B2901B,N8928A,6800B 系列,N7900 系列,B2901A,6627A,EL30000,N3304A,6614C,N5748A,6600,E4360,66106A,N6783A-BAT,N8929A,B2900A,B2912B,E5262A,6628A,B2912A,N3305A,N5749A,66311B,PV8922A,66105A,U8001A,E4368A,N3306A,E4356A,N5700,6672A,B1511B,6684A,PV8921A,RP7935A,CX3322A,BV9210B,RP7945A,RP7933A,B2962A,N8900 系列,N3307A,E4367A,RP7900 系列,N6900,B1510A,6673A,PV8932A,B2960,RP7946A,6620 系列,B2961B,B2961A,RP7932A,6674A,AC6906L,AC6918L,PV8931A,U2723A,U8002A,RP7943A,RP7931A,6675A,B1520A,6651A,PA2201A,U2722A,BV9201B,AC6900,N8760A,6652A,B2900A 系列,E36232A,AC6906H,66300,AC6918H,N6700,N8761A,6653A,E4362A,B1514A,6641A,E36231A,BV9211B,B2960系列,EDU36311A,N3300,B1513C,6654A,6642A,E36234A,N7900,CX3324A,667X,U2720,CX3300A,BV9200B,669X,E36200 系列,66000 系列,B1500A,6643A,B1512A,E36233A,6655A,6631B,AC6903L,668X,RP7936A,E36100B,AC6903H,E36100A,RP7962A,AC6804A,PV8900 系列,AC6804B,N8740A,E36103A,E36103B,N6791A,AC6912L,AC6912H,RP7973A,RP7961A,6035A,66309B,E36102B,E36102A,66309D,N8741A,AC6802B,RP7972A,AC6802A,E3600 系列,E36311A,N8762A,B2960 系列,E36105B,N6781A,E36105A,6690A,E3641A,RP7983A,N3300 系列,AC6803A,AC6803B,N8900,E36104B,E36104A,N6792A,E3640A,6691A,AC6800A,N6790,AC6800B,N6783A-MFG,RP7942A,E3600,6038A,N6900 系列,E36313A,6692A,N6783A,N8756A,6680A,N8732A,PV8900,N8950A,RP7941A,AC6801A,AC6801B,N6780,RP7953A,E36312A,N6782A,E36106B,E36106A,AC6900 系列,N8757A,6681A,N8733A,N8951A,RP7952A,N7971A,6682A,N6785A,N6773A,N6761A,N8754A,N8742A,RP7963A,RP7951A,N7970A,N8700,6683A,6671A,N6784A,N8755A,N8731A,N5770A,6629A,N7973A,E3647A,N6775A,N6763A,N8736A,N6751A,N8954A,N8930A,E36300 系列,E36340,6063B,E5260A,N5771A,N1259A,6812B,N7972A,E36100,E3646A,6811C,6811B,E36100 系列,N6786A,N8737A,N6774A,N6762A,N8943A,AC6800A 系列,N8955A,N8931A,E3634A,N5772A,N1258A,6813C,6813B,N7951A,6800C,E3649A,E36100B系列,6812C,6800B,AC6800B 系列,N6753A,N8758A,N6741B,N8734A,N6971A,N8952A,N6777A,N8940A,N6765A,EL30000 系列,E5270B,N5761A,N7950A,N7974A,N8700 系列,E3648A,N8759A,N6764A,N6752A,N6970A,N8735A,N8941A,N6776A,RP7982A,6030A,N5750A,N7953A,N7977A,N5762A,N1268A,N8934A,N6743B,N6731B,N8946A,N6973A,E36100B 系列,E3643A,E3631A,N6755A,14585A,CX3300A 系列,6031A,N7976A,N5763A,N5751A,E36300,N7952A,N1267A,N6972A,N8923A,N6790 系列,N8935A,N6742B,E3630A,E3642A,N6766A,N6754A,N5700 系列,N8738A,6032A,6030 系列,N5752A,N5764A,RP7900,B2910BL,N1266A,N6951A,N8932A,N8944A,N8920A,E3645A,N6745B,E3633A,N6733B,N8739A,6033A,N7954A,N5741A,N5765A,66319B,N1265A,N6950A,N8945A,N6732B,N8957A,N8921A,E3632A,E3620A,N6756A,N6974A,E3644A,N6744B,66319D

选型指南  -  KEYSIGHT  - 2021年11月16日 PDF 中文 下载

Keysight Enables First O-RAN Open Distributed Unit Fronthaul Certificate for ArrayComm through APOP

Keysight Technologies has enabled ArrayComm to obtain the first O-RAN ALLIANCE Fronthaul Certificate of Conformance for its open distributed unit (O-DU) with the Keysight Open RAN Architect (KORA) solutions. The certification was issued by the Asia & Pacific OTIC in PRC (APOP).

原厂动态    发布时间 : 2023-03-30

【选型】Keysight(是德科技)通用及基础测量仪器样本

目录- 示波器和探头    数字万用表    数字采集和开关    频率计数器、函数和任意波形发生器    电源    射频仪表   

型号- U1272A,34460A,34133A,53140,N5742A,N5766A,E4980ALU-050,N2919A,N576XA,N5439A,6644A,661XC-220,54600S,34905A,3446MEMU,3000X,U2700,N674XB,34132A,34132B,53150,N5743A,53151,N5767A,661XC-OL2,664XA,3024T,N2918A,6621A,3000T,53152,6645A,N2918B,N9310A-1CM,661XC-230,U1273A,34904A,U1620,E364XA-1CM,N6746B,3000X,DSOXGPIB,N8948A,1000,34131A,DSOX4AUTO,N5744A,N5768A,N2917B,6622A,N3300A,8120-4383,TPS://WWW.SEKORM.COM/WEB/SEARCH/KEYWORDN2801A,34903A,663XB-0B3,DSOX4SENSOR,N8900A,66102A,N6701A,E5387A,66000,U1271A,N8949A,66002A 66001A,11059A,6624A,N5745A,668XA-0B3,8120-5488,N5769A,3022T,6623A,N3301A,33500,8120-5489,34902A,66101A,N9340B-AMA,N2916B,U1600,N6700B,33509B,N7020A,6625A,DSOXLAN,4000X,N3302A,N5746A,8120-5413,8120-6502,N2874,8120-5412,N574XA,U1604A,8120-6980,34901A,34925A,66104A,8120-6507,N2915A,8120-5414,U2802A,66321D,N9310A-1HB,DSO1072B,66321B,663XB-760,B2902A,4000X,6626A,N3303A,N5747A,8120-5421,N2829A,N2862,600,66103A,34924A,N2805A,N6702A,N6705B,N9330B,668XA-909,B2901A,6627A,668XA-908,N3304A,U1602A,N2828A,N5748A,34923A,34947A,8120-8705,N2804A,66106A,6628A,891A,669XA-0L2,N3305A,N5749A,34922A,E5805A,34946A,N2827A,60XX-220,N2803A,66105A,U8001A,DSOX4EMBD,N2849A-68701,1000B,3000,1000A,TPS://WWW.SEKORM.COM/WEB/SEARCH/KEYWORD54600S,N3306A,DSOX4MASK,U1600A,U1210,N2791A/N2891A,34921A,6575A,34945A,1158A,6551A,6684A,3446SECU,N2826A,5485X,N2802A,E363XA-0L2,1134A,DSO1052B,34172B,N3307A,657XA,U3400,6552A,N2801A,60XX-240,5462X,N2825A,34171B,N9340B-ADP,DSOX2000,33612A,33503A,1131A,N9310A,663XB-8ZJ,U1731B,6553A,N2800A,N3300A-UJ1,N2739A,N2848A,N2824A,8121-0695,8121-0694,DSOX2APPBNDL,33611A,B2960A,U8002A,E4980ALU-201,N33313A,1132A,DSOX2AUTO,8120-43831,U3606A,U1732B,6554A,34942A,681XB-1CP,BNC,1157A,U3606B,5464X,681XB-1CM,2000 X,N2738A,DSOX3ADVMATH,6551,N9340B-ABJ,8120-5490,8121-1330,N9340B-ABA,2000X,8121-1331,655XA,8120-8767,53100,8120-8768,34941A,6555A,34832A,663XB-120,N2822A,N9340B-AB2,3000TX,33500B,N5,N9330B-ADP,1130A,U2600A,N9340B-PA3,DSOX3EMBD,200,6641A,669XA-0B3,1131.,N2821A,DSOX3MASK,4000 X,5000,N3300,AC6800,6642A,34830A,N7900,N2820A,N2759A,33522A,33522B,1180CZ,663XB-100,DSOX4COMP,N9310A-1T,N9340B-TG3,6643A,N2867A,N2843A,U1401B,N9340B-INM,AC6804A,DSOX3AUDIO,34840B,DSOX4FLEX,669XA-908,669XA-909,N2733A,N2866B,N2733B,3458A-002,DSOX2EMBD,3458A-001,E2695A,DSO1012A,34972A,N9310A-1TC,60001,N2889A,N2756A,6063B-020,N2732A,AC6802A,6000A,U1270,6000X,DSO1014A,U1880A,N9340B-TAD,90000 X,663XB-020,N2779A,N2888A,6000L,DSOX3COMP,E2697A,N2863B,AC6803A,U2751A,34970A,L4411A,6000X,34401A,N9330B-202,N9330B-203,U1881A,N9330B-201,N2778A,N2887A,54826,8120-1689,7000,N2862B,E4980A-710,668XA-208,54830,U1250,DSOXEDK,6571A,681XB-208,N875XA,N2777A,6680A,N8756A,N8732A,N8950A,TPS://WWW.SEKORM.COM/WEB/SEARCH/KEYWORD1163A,E3610-17A,AC6801A,DSOX3FLEX,681XB-200,10070D,N2885A,N2752A,N5440A,E3451B,81180A,U2531A,54600,6572A,E4980AL-100,6681A,N8757A,N2776A,U3402A,N8733A,53147A,8120-2956,N8951A,681XB-230,N2884A,N2751A,N7971A,DSO1102B,6641A-45A,DSOX2COMP,64997A,6682A,U1230,6573A,U3401A,N6773A,B2980A,N8754A,N7970A,N2750A,DCA-J 86100D,53230A,6813B-019,N5442A,6631BA,8120,6574A,6683A,54620,U1240,N8755A,5484X,N8731A,N2797A,N5770A,N2882A,N873XA,N5443A,34420A,N7973A,10073D,DSOXDVM,E2678A,80000,N28,N6775A,N8736A,8120-2104,N6751A,N8954A,DSOX4PWR,N2881A,E2655C,6063B,N2796A,N5444A,P66321B,N5771A,6812B,N7972A,10074D,E2679A,N5468A,N9340B-XDM,6811B,11053A,9000X,N8737A,N6774A,DSOX3MSO,N8955A,E3634A,N2771B,N2880A,DSOXPERFMSO,N6450,N2795A,N5772A,N5469A,9000,6813B,N5445A,U2356A,8121-6203,N7951A,N6459,N6753A,N8758A,U1242B,N6971A,N8734A,33220A,N8952A,N6777A,681XB-026,53181A,681XB-020,U2331A,661XC-760,10072A,N7950A,60XX-0B3,U2355A,N7974A,DSOX4AUDIO,34465A,E5813A,34138A,E4356A-909,E4356A-908,U1461A,N8759A,N6752A,N6970A,N8735A,N677XB,N6776A,N2793A,N9340B-IBC,U1591A,11058A,U2354A,N5750A,N7953A,N7977A,N5447A,N5423A,E5810B,E5810A,N6731B,N6973A,N2914,DSOX4APPBNDL,661XC-0B3,E3631A,N6755A,N2792A,DSOX3VID,E2675A,DSOX2MASKM,34330A,U2353A,N7976A,E4980AL,N5751A,N9340B-1TC,N5448A,N5424A,N7952A,34136A,DSOX2SEM,N3331A,N6972A,U1241B,E3630A,DSOX4AERO,34908A,N6754A,E2676A,N2791A,N9330B-1TC,N8738A,10075A,U2352A,N5752A,N5425A,U1452AT,3000T X,N577XA,N5449A,DSOXT3DVMCTR,7000B,TPS://WWW.SEKORM.COM/WEB/SEARCH/KEYWORD10076C\,3000 X,U2700 USB,U1177A,N6951A,E363XA-1CM,N2836A-68701,34907A,E3633A,N6733B,E2677A,N9310A-001,N2790A,N675XA,66000A-909,E4980A-301,N8739A,66000A-908,N7954A,10076B,34134A,10076C,U2351A,N5426A,34461A,66319B,8120-4753,N6732B,N6950A,N8957A,E3632A,34906A,N6756A,N6974A,66319D,N9330B-BCG,B2911A,N2111A,8120-5570,N9340B,E2614A,1161A,DSOX3AERO,6632B,8120-5572,N1022B,8120-5573,33250A,54830S,8120-5337,N6735B,N6977A,N6711A,N6953A,661XC-100,1162A,E2615A,6633B,34945EXT,N9330B-BAT,3012T,8120-5342,N6710B,66002A,N6976A,90000Z,N6734B,N6952A,DSOX4WAVEGEN2,90000X,U8031A,663XB-1CM,90000Q,663XB-1CP,34470A,E2616A,N575XA,6634B,8120-6204,661XC-120,90000A,66332A,6651A-55,DSOX2WAVEGEN,34939A,N673XB,1132,1131,82351A,1160A,N2819A,6611C,3034T,N5406A,8120-8871,66000A-0L2,34938A,N6736B,N6954A,N6712A,90000,E5396A,N9320B,6612C,N2818A,E

选型指南  -  KEYSIGHT  - 2015  - 2015年06月10日 PDF 中文 下载

【选型】Keysight(是德科技)Agilent 射频和微波开关选型指南

目录- 射频和微波开关产品系列    机电同轴开关特性    机电开关产品性能    机电开关的典型应用    固态开关特性    低视频泄漏和超快的稳定时间    固态开关典型应用    驱动开关    11713B/C衰减器/开关驱动器典型应用    选择正确的开关技术    机电(EM)开关选型表    机电开关订货信息    衰减器/开关驱动器订货信息   

型号- 87106D,N1812UL,8766K,87106A,87106C,87106B,11713B-401,11713B-801,U9397C,U9397A,L7104D,11713B-001,L7104B,34945A,L7104C,L7104A,L4490A,70611A,8765F,11764-60004,8765D,U1810TL,P9400,8765B,87606B,8765C,8765A,P9404,P9402,L4445A,11713C-601,11713C-201,11713-60043,11713-60042,11713-60044,11713-60047,5061-0969,8768M,8768K,U9397,11713B-908,11713B-909,P9400C,P9400A,11713B-501,11761-60001,U9400C,U9400A,11713B-101,SP2T,87204C,8767M,8767K,87204B,87204A,87406B,5061-9496,11713C-701,11713C-301,L4491A,N181X,11713B,5063-9212,11713A,P9373C,11713C,N1810UL,8762F,8762C,P9397A,8762A,8762B,P9402C,8764CL,SPDT,P9402A,11713B-601,11713B-201,FET SPDT,85331,5064-7848,SP4T,85332,85331B,8120-2703,87130A,N1810TL,87206B,8769M,87206A,8761B,8769K,87206C,11713C-001,8761A,34980A,11713C-801,L7222C,11713C-401,87106,SP3T,L7206C,87104,L7206A,L7206B,87222D,87222C,87222,87222E,85332B,87104C,87104B,87104D,87104A,8764C,11713B-301,8764A,8764B,P9404C,11713B-701,P9404A,L7106D,L7106B,L7106C,L7106A,SP6T,8762,N1811TL,L7104,8765,L7106,5063-9240,8763,8764,8763B,8763C,11713C-101,8763A,L7222,11713C-501,L7204C,L7204A,U9400,11713C-908,L7204B,11713C-909,SP5T

选型指南  -  KEYSIGHT PDF 中文 下载

Keysight(是德科技)数据采集系统和开关解决方案产品选型指南

目录- DAQ970A / DAQ973A Data Acquisition System and Modules    34980A Data Acquisition System and Modules    USB Data Acquisition Mainframe and Modules   

型号- DAQ970A,U2354A,DAQM905A,DAQM909A,U2653A,34941A,U2300,DAQM900A,34921A,34945A,34933A,34925A,34937A,DAQ973A,U2802A,U2781A,U2353A,DAQM902A,U2652A,34980A,U2300 SERIES,34945EXT,34952A,34932A,DAQM901A,34924A,U2651A,U2352A,DAQM903A,U2356A,DAQM907A,U2600 SERIES,34951A,34931A,34923A,34947A,34959A,U2600,34939A,DAQM904A,U2331A,U2351A,DAQM908A,U2751A,U2355A,34950A,34942A,34934A,34922A,34946A,34938A

选型指南  -  KEYSIGHT  - May 20, 2022 PDF 英文 下载

展开更多

现货市场

查看更多

品牌:KEYSIGHT

品类:Digital Volt Meter

价格:¥300.0000

现货:105

品牌:KEYSIGHT

品类:Software License

价格:¥5,885.8626

现货:92

品牌:KEYSIGHT

品类:Oscilloscope

价格:¥6,255.4404

现货:42

品牌:KEYSIGHT

品类:Oscilloscope

价格:¥2,032.6780

现货:39

品牌:KEYSIGHT

品类:Oscilloscope

价格:¥2,279.0608

现货:34

品牌:KEYSIGHT

品类:Oscilloscope

价格:¥5,964.0270

现货:33

品牌:KEYSIGHT

品类:Oscilloscope

价格:¥5,507.7707

现货:28

品牌:KEYSIGHT

品类:示波器升级软件

价格:¥300.0000

现货:26

品牌:KEYSIGHT

品类:Oscilloscope

价格:¥27,841.4996

现货:24

品牌:KEYSIGHT

品类:Oscilloscope

价格:¥5,642.3160

现货:16

品牌:

品类:

价格:

现货:

品牌:

品类:

价格:

现货:

品牌:

品类:

价格:

现货:

品牌:

品类:

价格:

现货:

品牌:

品类:

价格:

现货:

品牌:

品类:

价格:

现货:

品牌:

品类:

价格:

现货:

品牌:

品类:

价格:

现货:

品牌:

品类:

价格:

现货:

品牌:

品类:

价格:

现货:

电子商城

查看更多

暂无此商品

千家代理品牌,百万SKU现货供应/大批量采购订购/报价

查看更多

授权代理品牌:接插件及结构件

查看更多

授权代理品牌:部件、组件及配件

查看更多

授权代理品牌:电源及模块

查看更多

授权代理品牌:电子材料

查看更多

授权代理品牌:仪器仪表及测试配组件

查看更多

授权代理品牌:电工工具及材料

查看更多

授权代理品牌:机械电子元件

查看更多

授权代理品牌:加工与定制

世强和原厂的技术专家将在一个工作日内解答,帮助您快速完成研发及采购。
我要提问

954668/400-830-1766(工作日 9:00-18:00)

service@sekorm.com

研发客服
商务客服
服务热线

联系我们

954668/400-830-1766(工作日 9:00-18:00)

service@sekorm.com

投诉与建议

E-mail:claim@sekorm.com

商务合作

E-mail:contact@sekorm.com

收藏
收藏当前页面