Overview
Keysight BreakingPoint VE is a Layer 4-7 test solution designed to benchmark the performance and security of various network devices and applications. It emulates real-world application traffic mixed with threat simulation (attacks / malware) to measure key performance indicators useful for comparing the security posture across different network devices and applications, identifying potential configuration issues, assessing the performance bottlenecks, and ensuring the overall quality of experience for end users.
The validation is accomplished by deploying one or more BreakingPoint Virtual Blade instances and connecting them to the device or infrastructure under test. All these instances are controlled by one BreakingPoint Virtual Controller which configures the entire test topology and measures the relevant statistics. The tests can be performed via GUI-based execution or via API-based automation.
Ensure your network devices and applications have a correct security configuration and can deliver peak performance by testing them with Keysight BreakingPoint VE.
Highlights
- Benchmark network devices and applications hosted in various cloud regions or instance types. Create complex traffic profiles including real-world applications mixed with threat simulation across plain or encrypted connections. Measure key statistics such as throughput, connections / transactions per second, or simulated users.
- Validate virtual network functions like vFirewalls (NGFW / WAF), DLP, DPI, IDS, IPS, UTM, and others. Compare the capabilities of such virtual devices between on-premises deployments and public-cloud deployments. Optimize configurations and resource provisioning to achieve maximum performance.
- Expand current test beds from private data centers to public clouds. Scale out your automation framework and run multiple tests in parallel to speed up execution and reduce validation time. Benefit from a unified test approach regardless of private or public cloud environment.
Details
Unlock automation with AI agent solutions

Features and programs
Financing for AWS Marketplace purchases
Pricing
Vendor refund policy
This product is licensed under Keysight standard terms and conditions. For details please refer to the license agreement at the time of purchase.
How can we make this page better?
Legal
Vendor terms and conditions
Content disclaimer
Delivery details
64-bit (x86) Amazon Machine Image (AMI)
Amazon Machine Image (AMI)
An AMI is a virtual image that provides the information required to launch an instance. Amazon EC2 (Elastic Compute Cloud) instances are virtual servers on which you can run your applications and workloads, offering varying combinations of CPU, memory, storage, and networking resources. You can launch as many instances from as many different AMIs as you need.
Additional details
Usage instructions
- Launch one Keysight BreakingPoint Virtual Controller instance.
- Launch one (or more) Keysight BreakingPoint Virtual Blade instances.
- Connect via browser to the Keysight BreakingPoint Virtual Controller instance to the following link: https://VIRTUAL_CONTROLLER_IP
- Apply the BYOL license and start the BreakingPoint application to configure test parameters and initiate execution.
- Review the additional resources below for more information on product deployment and test configuration: https://downloads.ixiacom.com/library/user_guides/BreakingPoint/11.00/11.00_Rev_A/BPSVE_Install_Guide.pdfÂ
Resources
Vendor resources
Support
Vendor support
Contact our support team by emailing to support@ixiacom.com or by visiting our support portal at
AWS infrastructure support
AWS Support is a one-on-one, fast-response support channel that is staffed 24x7x365 with experienced and technical support engineers. The service helps customers of all sizes and technical abilities to successfully utilize the products and features provided by Amazon Web Services.