BreakingPoint FireStorm CTM Datasheet

  • 713 views
Uploaded on

The BreakingPoint FireStorm CTM™ Delivers 120 Gbps of Application and Live Attack Traffic to Harden Network and Data Center Resiliency …

The BreakingPoint FireStorm CTM™ Delivers 120 Gbps of Application and Live Attack Traffic to Harden Network and Data Center Resiliency

BreakingPoint’s Cyber Tomography Machines (CTMs) are the world’s only products capable of pinpointing previously impossible-to-detect weaknesses and vulnerabilities in networks, network
devices, and data centers before they are exploited to wreak havoc within critical network infrastructures. Leveraging all the power
and flexibility of the award-winning BreakingPoint Storm CTM, the BreakingPoint FireStorm CTM now takes performance to a new level to measure and harden the resiliency of today’s fastest and
most complex network and data center infrastructures.

More in: Technology
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Be the first to comment
    Be the first to like this
No Downloads

Views

Total Views
713
On Slideshare
0
From Embeds
0
Number of Embeds
0

Actions

Shares
Downloads
2
Comments
0
Likes
0

Embeds 0

No embeds

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
    No notes for slide

Transcript

  • 1. BreakingPoint FireStorm CTM™Optimize and Harden Enterprise IT ResiliencyBreakingPoint FireStorm CTM™, Only All-in-One Cyber Security Tool for Massive Scale IT InfrastructureBreakingPoint FireStorm CTM is used to evaluate, size, and con gure Understand the exact performance, security, and stability ofIT infrastructures to perform optimally and securely while under competitive products in a fraction of the timeload from millions of users, hundreds of applications, and thousands Harden network infrastructures by assaulting them withof cyber attacks. This all-in-one cyber security system pinpoints custom, global, and current blends of stateful applications, livepreviously impossible-to-detect weaknesses and vulnerabilities security attacks, and high-stress loads to probe every weaknessin networks, network devices, and data centers before they can and vulnerabilityadversely a ect IT operations. Ensure cloud and virtualized infrastructures operate at the highest performance levels with optimal securityThe compact 4U chassis system simulates 90 million users talking, Improve current application performance and roll out newtexting, emailing, sharing, and gaming, while simultaneously applications and additional users with con dencesending current attacks at 120 gigabits per second (Gbps). Based Create the most advanced cyber training environments,on a patented breakthrough in network-processor technology, delivering realistic cyber attack simulations to hone ITthe BreakingPoint FireStorm CTM provides unprecedented insight defender skillsby producing the same high-stress conditions and user behaviorthat device manufacturers, service providers, global enterprises,and government agencies face in the real world. BreakingPointFireStorm CTM allows organizations to: 150 Applications 4,500+ Live Security Attacks Unsurpassed Performance Voice/Video/Media 27,000 Malware Attacks 90 million concurrent TCP sessions Database 80+ Evasion Techniques 3 million TCP sessions per second Mail/Messaging Complete Microsoft Tuesday Coverage 120 Gbps blended application traf c Microsoft File Service 120,000+ SSL sessions per second Social Media/Gaming >> >>>> >> > >> > > > >> > > >>>> >> > > > > > > > > > > > > >> >> >> > >> >> > > >> > > > > >> > > > > > >>> > > > > > >> >> > > > >>>> >>>> > >> >>
  • 2. BreakingPoint FireStorm CTM™Evaluate, size, and con gure network and data center Designed to adapt rapidly to change and ensure ongoingequipment with a scalable, easy-to-use modeling and resiliencytesting system The BreakingPoint FireStorm CTM ships with the latest applications,Driven by an easy-to-use user interface, the BreakingPoint FireStorm security attacks, and performance upgrades and is updated weeklyCTM provides users the ability to evaluate and select the most using the BreakingPoint Application and Threat Intelligence (ATI)™appropriate network and data center equipment for their business. Program. Backed by a team of security and application experts, thisUsing their own unique network tra c conditions, organizations service ensures the most popular and dynamic Web and networkcan implement a standardized, repeatable, and deterministic application protocols are always at your ngertips.product assessment to select the right device and keep it resilient inthe face of system changes. The BreakingPoint FireStorm CTM is also BreakingPoint Resiliency Score: End the vendor data sheetthe ideal system to determine capacity requirements, application guessing gameload needs, and stability of virtualized data centers. This all-in-one The BreakingPoint Resiliency Score™ and the BreakingPointsystem includes: Data Center Resiliency Score™ put an end to relying on product Ability to create 90 million online users marketing literature by establishing standards against which More than 150 popular application protocols out of the box for networks and data centers are measured. Each score provides an enterprise IT departments, government agencies and service automated, standardized, and deterministic method for evaluating provider networks and ensuring resiliency. This feature of the BreakingPoint FireStorm 27,000 pieces of live malware, including the very latest CTM provides the standard measurement using real-world distributed denial of service (DDoS) attacks application tra c, real-time security attacks, extreme user load, and SSL Bulk Encryption at 38 Gbps with any cipher application fuzzing. Ability to measure network latency down to 10-nanosecond resolution About BreakingPoint Systems 4,500+ live security attacks out of the box, with full coverage for BreakingPoint products are the standard by which the world’s Microsoft security updates within 24 hours of announcement governments, enterprises, and service providers harden Sophisticated attack simulation with more than 100 evasion, and optimize the resiliency of their network and data center live malware, botnet, and DDoS attacks, plus full protocol infrastructures. Learn more about BreakingPoint products and fuzzing and more services by contacting a representative in your area. Intuitive user interface with precon gured simulations, real- time statistics, and extensive reporting 1.866.352.6691 U.S. Toll Free Automated point-and-click capabilities and a library of www.breakingpoint.com prebuilt pro leswww.breakingpoint.com© 2005 - 2011. BreakingPoint Systems, Inc. All rights reserved. The BreakingPoint logo is a trademark of BreakingPoint Systems, Inc.All other trademarks are the property of their respective owners.