New SaaS-based Cloud Application Monitoring Solution

Ixia, a Keysight Business, Delivers Consistent Quality of Experience

Hawkeye Express monitors and tests cloud applications on any third-party public cloud

Keysight Technologies, Inc. (NYSE: KEYS), a leading technology company that helps enterprises, service providers, and governments accelerate innovation to connect and secure the world, has expanded the Ixia visibility portfolio with Hawkeye Express, a software-as-a-service (SaaS) extension to the Hawkeye network assessment and monitoring platform. Hawkeye Express enables customers to monitor and test cloud applications on any third-party public cloud platform to ensure a consistent quality of experience (QoE) for end users.

The migration of applications to the public cloud presents new challenges in the way enterprises monitor networks and applications. This includes losing the ability to perform network performance monitoring, as well as assessment troubleshooting with traditional tools due to lack of access to the delivery infrastructure and packets in the public Internet and cloud.

“As enterprises migrate their applications to the public cloud, they are faced with diminishing control of their application performance,” said Recep Ozdag, vice president, product management for Keysight’s Ixia Solutions Group. “The Hawkeye Express active monitoring solution provides visibility and troubleshooting capabilities that provide users access to their cloud and WAN services. Using Hawkeye Express allows customers to truly understand network and application performance to ensure a consistent quality of experience for their end users.”

Hawkeye Express is a cloud-based SaaS solution based on active, synthetic monitoring that delivers visibility into public and private infrastructure and services. Hawkeye Express enables users to:

  • Gain visibility into infrastructure between sites – by deploying endpoints on each site, they can monitor network performance between sites using performance assessments, regular reporting and alarms when services degrade
  • Monitor cloud access infrastructure continuously – they can monitor and troubleshoot problems at third-party service providers networks by performing access verifications and pinpointing to problems
  • Understand capacity of a network or equipment – they can verify equipment and infrastructures in the lab or in the network using software or hardware endpoints as traffic injectors and benchmarking equipment and traffic models