List of Keysight Application Threat Intelligence Integrations

This is a list of platforms and tools that integrate with Keysight Application Threat Intelligence. This list is updated as of May 2026.

  • 1
    EndaceProbe Reviews & Ratings

    EndaceProbe

    Endace

    Scalable, Always-On Packet Capture for On-Prem, Private and Public Cloud Networks
    EndaceProbes provide an impeccable record of Network History, facilitating the resolution of Cybersecurity, Network, and Application issues. They ensure complete transparency for every event, alert, or problem through a packet capture system that integrates effortlessly with a variety of commercial, open-source, or bespoke tools. By offering a comprehensive view of network activities, these probes empower users to conduct in-depth investigations and defend against even the most challenging Security Threats. They effectively capture crucial network evidence, speeding up the resolution of Network and Application Performance issues or outages. The open EndaceProbe Platform merges tools, teams, and workflows into a unified Ecosystem, ensuring that Network History is easily accessible from all your resources. This integration is seamlessly embedded within existing workflows, so teams are not burdened with learning new tools. Furthermore, it acts as a versatile open platform that supports the implementation of preferred security or monitoring solutions. With the ability to record extensive, searchable, and precise network history across your entire infrastructure, users can adeptly manage and respond to various network challenges as they emerge. This holistic strategy not only boosts overall security but also improves operational efficiency, making it an indispensable asset for modern network management. Additionally, the platform’s design fosters collaboration among different teams, enhancing communication and ensuring a swift response to incidents.
  • 2
    Optiv Managed XDR Reviews & Ratings

    Optiv Managed XDR

    Optiv

    Empowering resilience through advanced cybersecurity and tailored strategies.
    Cybercriminals are resourceful, relentless, and highly motivated, frequently utilizing the same instruments as their intended victims. They have the ability to mask their presence within your systems and rapidly expand their reach. Our profound insight into the cybersecurity domain is a result of our active participation in it, which shapes our strategies and actions. The unique advantage of our MXDR solution is derived from this experience, enriched by proven methods, dependable intellectual assets, advanced technology, and a dedication to harnessing automation, all while enlisting highly trained experts to manage every aspect. In collaboration, we can devise a customized approach that ensures comprehensive threat visibility and enables prompt identification, examination, triage, and response to reduce risks to your organization effectively. We will integrate your existing investments across endpoint, network, cloud, email, and OT/IoT solutions to create a cohesive technological framework. This strategy decreases your vulnerability to attacks, accelerates threat detection, and supports in-depth investigations through an ongoing methodology, guaranteeing strong defenses against a range of cyber threats. Our joint initiatives will not only fortify your security measures but will also cultivate a proactive security mindset within your organization, empowering your team to stay ahead of emerging threats. With the combination of our expertise and your infrastructure, we can build resilience against the continually evolving cyber landscape.
  • 3
    BlueSwan Reviews & Ratings

    BlueSwan

    Cigniti

    Accelerate digital transformation with intelligent, quality-driven solutions.
    To successfully navigate the current wave of digital transformation, it is essential for organizations to effectively overhaul their business models. A key element of this transformation involves the incorporation of quality engineering services that leverage intelligence and automation, with a strong focus on improving customer experiences. Designed to excel within agile and DevOps environments, these services harness deep industry expertise to develop customized solutions that prioritize rapid quality delivery. They are instrumental in accelerating quality engineering for digital enterprises globally by tackling their testing challenges amid ongoing digital evolution. By guaranteeing superior software quality, these services enable clients to deploy applications that are not only dependable and resilient but also scalable and secure. Furthermore, they enhance our proprietary quality engineering and software testing capabilities, highlighting a domain-centric approach to provide exceptional digital transformation solutions across diverse industries, ultimately promoting sustainable growth in an ever-evolving digital environment. As businesses continue to adapt, the importance of these services will undoubtedly increase, making them indispensable in achieving long-term success.
  • 4
    SentryWire Reviews & Ratings

    SentryWire

    SentryWire

    Achieve unparalleled network visibility and security with confidence.
    SentryWire is an all-encompassing packet capture and network security monitoring solution that provides extensive visibility across various industries, including enterprise, federal, and industrial control systems. Its ability to store packet capture data for long durations—ranging from several weeks to multiple years—enables security teams to retain crucial insights and conduct thorough threat investigations long after other tools have ceased to be useful. Leveraging commodity hardware, distributed storage, and a modular architecture, SentryWire effectively captures, indexes, and preserves full packet data at scale, making it suitable for setups of any size, from lightweight virtual environments to large enterprise clusters. Unlike conventional packet sniffers, which typically capture only headers or metadata, SentryWire records the entire packet stream, facilitating forensic replays, detailed packet analysis, and comprehensive retrospective reviews, thus allowing for a deeper understanding of network events. It supports capture speeds ranging from a modest 1 Mbps to a remarkable over 1 Tbps and includes features like real-time logging, advanced filtering, compression, visualization, and intricate BPF-syntax analysis, all aimed at enhancing security operations. This powerful platform ultimately equips organizations with the tools they need to confidently navigate intricate network landscapes, ensuring they stay alert and responsive to new and evolving threats. By implementing such a sophisticated system, businesses can significantly improve their overall network security posture.
  • Previous
  • You're on page 1
  • Next