BreakingPoint & McAfee RSA Conference 2011 Presentation: Data Sheets Lie
Upcoming SlideShare
Loading in...5
×
 

BreakingPoint & McAfee RSA Conference 2011 Presentation: Data Sheets Lie

on

  • 817 views

BreakingPoint and McAfee presentation "Exposing Data Sheet Myths" at the RSA Conference 2011.

BreakingPoint and McAfee presentation "Exposing Data Sheet Myths" at the RSA Conference 2011.

Statistics

Views

Total Views
817
Slideshare-icon Views on SlideShare
816
Embed Views
1

Actions

Likes
0
Downloads
2
Comments
0

1 Embed 1

http://www.linkedin.com 1

Accessibility

Categories

Upload Details

Uploaded via as Adobe PDF

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment

    BreakingPoint & McAfee RSA Conference 2011 Presentation: Data Sheets Lie BreakingPoint & McAfee RSA Conference 2011 Presentation: Data Sheets Lie Presentation Transcript

    • Exposing Data Sheet MythsWhy Guess When You Can Know?
    • IT Firestorm Threatens Business Performance…
    • …Networks and Data Centers Remain Vulnerable3
    • But The Data Sheet Said _____________!4
    • Five Steps To Expose Data Sheet Lies: #1 Performance With Blended Applications + Load5
    • Five Steps To Expose Data Sheet Lies: #2 Attack Detection Under Load6
    • Five Steps To Expose Data Sheet Lies: #3 Performance With Live Attack + Load7
    • Five Steps To Expose Data Sheet Lies: #4 Maximum Capacity With Application Traffic8
    • Five Steps To Expose Data Sheet Lies: #5 Stability and Functionality Under Extended Attack9
    • End The Data Sheet Guessing Game Versus Versus10
    • How? Attack Thyself!Real Attacks• 4,500 live security attacks• 100+ evasions• Malware• Spam• DDoS and Botnet simulation• Custom attacks• Research and frequent updatesReal World Applications• 150+ application protocols• Social media, peer-to-peer, voice, video• Web and enterprise applications, gaming• Custom applications• Frequent updatesUnprecedented Performance• 120 Gbps blended application traffic• 90M concurrent TCP sessions• 3M TCP sessions/second• 38 Gbps SSL bulk encryption
    • Questions and Answers12