• Share
  • Email
  • Embed
  • Like
  • Save
  • Private Content
Breakingpoint Application Threat and Intelligence (ATI) Program
 

Breakingpoint Application Threat and Intelligence (ATI) Program

on

  • 659 views

 

Statistics

Views

Total Views
659
Views on SlideShare
659
Embed Views
0

Actions

Likes
0
Downloads
5
Comments
0

0 Embeds 0

No embeds

Accessibility

Categories

Upload Details

Uploaded via as Adobe PDF

Usage Rights

CC Attribution License

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment

    Breakingpoint Application Threat and Intelligence (ATI) Program Breakingpoint Application Threat and Intelligence (ATI) Program Document Transcript

    • BreakingPoint Application and Threat Intelligence ProgramBreakingPoint Application and Threat Intelligence(ATI) ProgramA comprehensive service and support program for optimizing and hardening the resiliency of ITinfrastructures that includes product updates, authentic application protocols, real-world security attacks,and responsive supportBreakingPoint Cyber Tomography Machine™ (CTM) products expose The BreakingPoint ATI Program includes:previously impossible-to-detect vulnerabilities and weaknesses in • All software updates and enhancementsapplications, devices, networks, and data centers before they can • Frequent application protocol releases to library ofadversely affect IT operations. 150+ applicationsEvery BreakingPoint CTM is designed for speed, realism, and ease • Research into emerging security vulnerabilitiesof use. A key aspect of the design is the BreakingPoint Application • Frequent security updates to library of 4,500+ securityand Threat Intelligence (ATI) Program, a responsive and all-inclusive attacks, 100+ evasion techniques, and 28,000+ pieces ofservice and support program. Our team of dedicated application live malware, including mobile malwareand security researchers provides everything you need for thorough • Microsoft® Tuesday updates within 24 hoursmeasurement of the performance, security, and stability of IT • Priority access to problem resolution teaminfrastructures, including access to all application protocols, security • Personalized service and supportattacks, product enhancements, and full service and support. In • Single point of contact for problem resolutionone comprehensive program, you can tap into the resources and • Convenient technical support optionsexpertise you need to keep your simulations current and realistic. • Community and educational resourcesThe ATI Program includes all of the following:Frequent Application Protocol Updates and Data Loss Prevention (DLP) products. These are the EvergreenWith a current ATI Program agreement, you are assured of the Application Protocols supported:most realistic simulation conditions possible with access to the • AOL Messaginglatest applications. The BreakingPoint ATI team uses advanced • AOL Webmailsurveillance techniques and methodologies to identify, capture, • Google Mail (Gmail)and rapidly deliver the emergent business, consumer, and malicious • Google Talkapplications you need to conduct meaningful and thorough • ICQperformance and security validation. • Jabber (XMPP) • MSN MessagingConsistent with BreakingPoint’s all-inclusive approach, your ATI • Windows Live MailProgram account gives you automatic access to all newly releasedprotocols, software fixes, operating system updates, and other • Yahoo! Mailresource downloads. • Yahoo! MessagingEvergreen Application Protocols Updates from the Industry’s Top Security ResearchersContent-aware network and security devices are at a severe Security threats are constantly evolving, with new vulnerabilitiesdisadvantage if they are not tested using the most current versions discovered each day. Your simulation conditions must reflect the latestof the most popular application protocols. The BreakingPoint security threats so that you can ensure your equipment will performEvergreen Applications program addresses this need by providing reliably and protect your infrastructure from the most advanced andever-current versions of popular Web and network applications malicious traffic. Our team of experts does the research for you byfor validating deep packet inspection (DPI), Lawful Intercept (LI), identifying and generating security attacks that meet your needs.
    • BreakingPoint Application and Threat Intelligence ProgramWe don’t license our security attacks from other vendors: Our award- Warranty Provisions/Extended Hardware Optionswinning staff of application and security researchers provides timely BreakingPoint provides a one (1) year standard hardware warrantyupdates, ensuring we deliver the industry’s most complete security or an optional extended hardware warranty. Please contactupdates. Currently we provide: your sales representative or an authorized reseller for additional • 4,500+ security strikes and 100+ evasion techniques information on extended hardware warranty options. • 28,000+ pieces of live malware, including mobile malware, which can be launched through multiple transports, including More Information HTTP, SMTP, POP, and IMAP, and embedded within popular file Custom ATI Program packages are available for site licenses types such as .doc, .pdf, .ppt, and .xls and multi-year programs. For more information about how the • The industry’s most comprehensive Microsoft® Tuesday BreakingPoint ATI Program can help you harden your IT infrastructure, coverage, with 24-hour response time please contact your regional sales representative today. • SYN flood attacks with more than 1million connections per second Contact BreakingPoint • The ability to direct attacks at networking devices or target servers Learn more about BreakingPoint products and services by • Application layer fuzzing to detect previously unknown contacting a representative in your area. vulnerabilities 1.866.352.6691 U.S. Toll Free www.breakingpoint.comConvenient Technical Support OptionsBreakingPoint offers a range of responsive support options to ATI BreakingPoint Global HeadquartersProgram customers. You can get answers to questions and requests, 3900 North Capital of Texas Highwayincluding phone-based, email, and online support. Experienced Austin, TX 78746technical representatives are available Monday through Friday, email: salesinfo@breakingpoint.com7:00 am – 7:00 pm central time. Or you can bypass phone support tel: 512.821.6000and submit your service requests online. Open a new request or toll free: 866.352.6691update and check the status of existing requests via email at yourconvenience. BreakingPoint EMEA Sales Paris, FranceAuthorized Technical Support Contacts email: emea_sales@breakingpoint.comAs an ATI Program customer, you may designate people within your tel: + 33 6 08 40 43 93organization who are authorized to submit an unlimited number ofservice requests to our support technicians. If desired, BreakingPointwill designate a support specialist to serve as your single point of BreakingPoint APAC Salescontact for requests. This expert will become familiar with your Suite 2901, Building #5, Wanda Plazaenvironment and facilitate the delivery of solutions that meet your No. 93 Jianguo Roadneeds. Chaoyang District, Beijing, 100022, China email: apac_sales@breakingpoint.comProfessional Services Engagements tel: + 86 10 5960 3162ATI Program customers have free access to all Web-based tutorialsand may also purchase on-site technical training. Our expertconsultants are available on a contract basis to review yoursimulation and measurement plans and ensure that they arecurrent, rigorous, and comprehensive. Our Professional Servicesstaff can also visit your site to address your most pressing issues andquestions or oversee critical projects.www.breakingpoint.com© 2005 – 2011. BreakingPoint Systems, Inc. All rights reserved. The BreakingPoint logo is a trademark of BreakingPoint Systems, Inc.All other trademarks are the property of their respective owners.