0
Exposing Data Sheet MythsWhy Guess When You Can Know?
IT Firestorm Threatens Business Performance…
…Networks and Data Centers Remain Vulnerable3
But The Data Sheet Said _____________!4
Five Steps To Expose Data Sheet Lies: #1    Performance With Blended Applications + Load5
Five Steps To Expose Data Sheet Lies: #2           Attack Detection Under Load6
Five Steps To Expose Data Sheet Lies: #3        Performance With Live Attack + Load7
Five Steps To Expose Data Sheet Lies: #4    Maximum Capacity With Application Traffic8
Five Steps To Expose Data Sheet Lies: #5    Stability and Functionality Under Extended Attack9
End The Data Sheet Guessing Game                    Versus                    Versus10
How? Attack Thyself!Real Attacks•   4,500 live security attacks•   100+ evasions•   Malware•   Spam•   DDoS and Botnet sim...
Questions and Answers12
Upcoming SlideShare
Loading in...5
×

BreakingPoint & McAfee RSA Conference 2011 Presentation: Data Sheets Lie

589

Published on

BreakingPoint and McAfee presentation "Exposing Data Sheet Myths" at the RSA Conference 2011.

Published in: Technology, Business
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
589
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
6
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Transcript of "BreakingPoint & McAfee RSA Conference 2011 Presentation: Data Sheets Lie"

  1. 1. Exposing Data Sheet MythsWhy Guess When You Can Know?
  2. 2. IT Firestorm Threatens Business Performance…
  3. 3. …Networks and Data Centers Remain Vulnerable3
  4. 4. But The Data Sheet Said _____________!4
  5. 5. Five Steps To Expose Data Sheet Lies: #1 Performance With Blended Applications + Load5
  6. 6. Five Steps To Expose Data Sheet Lies: #2 Attack Detection Under Load6
  7. 7. Five Steps To Expose Data Sheet Lies: #3 Performance With Live Attack + Load7
  8. 8. Five Steps To Expose Data Sheet Lies: #4 Maximum Capacity With Application Traffic8
  9. 9. Five Steps To Expose Data Sheet Lies: #5 Stability and Functionality Under Extended Attack9
  10. 10. End The Data Sheet Guessing Game Versus Versus10
  11. 11. How? Attack Thyself!Real Attacks• 4,500 live security attacks• 100+ evasions• Malware• Spam• DDoS and Botnet simulation• Custom attacks• Research and frequent updatesReal World Applications• 150+ application protocols• Social media, peer-to-peer, voice, video• Web and enterprise applications, gaming• Custom applications• Frequent updatesUnprecedented Performance• 120 Gbps blended application traffic• 90M concurrent TCP sessions• 3M TCP sessions/second• 38 Gbps SSL bulk encryption
  12. 12. Questions and Answers12
  1. A particular slide catching your eye?

    Clipping is a handy way to collect important slides you want to go back to later.

×