BreakingPoint & Stonesoft RSA Conference 2011 Presentation: Evaluating IPS
Upcoming SlideShare
Loading in...5
×
 

BreakingPoint & Stonesoft RSA Conference 2011 Presentation: Evaluating IPS

on

  • 754 views

BreakingPoint and Stonesoft presentation "Know the Score: Measure the Security and Performance of Your Next IPS" at the 2011 RSA Conference.

BreakingPoint and Stonesoft presentation "Know the Score: Measure the Security and Performance of Your Next IPS" at the 2011 RSA Conference.

Statistics

Views

Total Views
754
Views on SlideShare
754
Embed Views
0

Actions

Likes
0
Downloads
2
Comments
0

0 Embeds 0

No embeds

Accessibility

Categories

Upload Details

Uploaded via as Adobe PDF

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment

BreakingPoint & Stonesoft RSA Conference 2011 Presentation: Evaluating IPS BreakingPoint & Stonesoft RSA Conference 2011 Presentation: Evaluating IPS Presentation Transcript

  • Know the Score: Measure the Securityand Performance of Your Next IPSFebruary 15th at 3:30pm
  • Who is Stonesoft?• Founded in 1990• Global presence – US Headquarters - Atlanta, GA – Global Headquarters - Helsinki, Finland – 60+ countries, 24 offices• Next Generation Security Solutions: IPS, FW/VPN, SSL VPN, and Centralized Management – all High Availability• Global innovator: 28 patents, 38 pending around High Availability and Performance• Focus on simplifying the management of network security2
  • IT Firestorm Threatens Business Performance
  • Is Your IPS Resilient to the Firestorm?4
  • 5 Keys to IPS Evaluation: #1 Performance Under Load + Attack5
  • 5 Keys to IPS Evaluation: #2 Security Under Load + Attack6
  • 5 Keys to IPS Evaluation: #3 Performance and Accuracy of Protocol Decoding7
  • 5 Keys to IPS Evaluation: #4 Detection of Obfuscated Attacks8
  • 5 Keys to IPS Evaluation: #5 Identify Memory Leaks9
  • How? Attack Thyself!Real Attacks• 4,500 live security attacks• 100+ evasions• Malware• Spam• DDoS and Botnet simulation• Custom attacks• Research and frequent updatesReal World Applications• 150+ application protocols• Social media, peer-to-peer, voice, video• Web and enterprise applications, gaming INSERT R.S.• Custom applications GRAPHIC• Frequent updatesUnprecedented Performance• 120 Gbps blended application traffic• 90M concurrent TCP sessions• 3M TCP sessions/second• 38 Gbps SSL bulk encryption
  • Validating Intrusion Prevention Systems Intrusion Prevention System Blended Applications + Live Security Strikes + Extreme User Load + Fault Injection/ Fuzzing BreakingPoint Storm CTMREMEMBER TO EVALUATE:1. Performance Under Load + Attack2. Security Under Load + Attack3. Performance and Accuracy of Protocol Decoding4. Detection of Obfuscated Attacks5. Identify Memory Leakage
  • Questions and Answers12