Your SlideShare is downloading. ×
  • Like
BreakingPoint & McAfee RSA Conference 2011 Presentation: Data Sheets Lie
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×

Now you can save presentations on your phone or tablet

Available for both IPhone and Android

Text the download link to your phone

Standard text messaging rates apply

BreakingPoint & McAfee RSA Conference 2011 Presentation: Data Sheets Lie

  • 548 views
Published

BreakingPoint and McAfee presentation "Exposing Data Sheet Myths" at the RSA Conference 2011.

BreakingPoint and McAfee presentation "Exposing Data Sheet Myths" at the RSA Conference 2011.

Published in Technology , Business
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Be the first to comment
    Be the first to like this
No Downloads

Views

Total Views
548
On SlideShare
0
From Embeds
0
Number of Embeds
0

Actions

Shares
Downloads
4
Comments
0
Likes
0

Embeds 0

No embeds

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
    No notes for slide

Transcript

  • 1. Exposing Data Sheet MythsWhy Guess When You Can Know?
  • 2. IT Firestorm Threatens Business Performance…
  • 3. …Networks and Data Centers Remain Vulnerable3
  • 4. But The Data Sheet Said _____________!4
  • 5. Five Steps To Expose Data Sheet Lies: #1 Performance With Blended Applications + Load5
  • 6. Five Steps To Expose Data Sheet Lies: #2 Attack Detection Under Load6
  • 7. Five Steps To Expose Data Sheet Lies: #3 Performance With Live Attack + Load7
  • 8. Five Steps To Expose Data Sheet Lies: #4 Maximum Capacity With Application Traffic8
  • 9. Five Steps To Expose Data Sheet Lies: #5 Stability and Functionality Under Extended Attack9
  • 10. End The Data Sheet Guessing Game Versus Versus10
  • 11. How? Attack Thyself!Real Attacks• 4,500 live security attacks• 100+ evasions• Malware• Spam• DDoS and Botnet simulation• Custom attacks• Research and frequent updatesReal World Applications• 150+ application protocols• Social media, peer-to-peer, voice, video• Web and enterprise applications, gaming• Custom applications• Frequent updatesUnprecedented Performance• 120 Gbps blended application traffic• 90M concurrent TCP sessions• 3M TCP sessions/second• 38 Gbps SSL bulk encryption
  • 12. Questions and Answers12