Breakingpoint Application Threat and Intelligence (ATI) Program
BreakingPoint Application and Threat Intelligence ProgramBreakingPoint Application and Threat Intelligence(ATI) ProgramA comprehensive service and support program for optimizing and hardening the resiliency of ITinfrastructures that includes product updates, authentic application protocols, real-world security attacks,and responsive supportBreakingPoint Cyber Tomography Machine™ (CTM) products expose The BreakingPoint ATI Program includes:previously impossible-to-detect vulnerabilities and weaknesses in • All software updates and enhancementsapplications, devices, networks, and data centers before they can • Frequent application protocol releases to library ofadversely affect IT operations. 150+ applicationsEvery BreakingPoint CTM is designed for speed, realism, and ease • Research into emerging security vulnerabilitiesof use. A key aspect of the design is the BreakingPoint Application • Frequent security updates to library of 4,500+ securityand Threat Intelligence (ATI) Program, a responsive and all-inclusive attacks, 100+ evasion techniques, and 28,000+ pieces ofservice and support program. Our team of dedicated application live malware, including mobile malwareand security researchers provides everything you need for thorough • Microsoft® Tuesday updates within 24 hoursmeasurement of the performance, security, and stability of IT • Priority access to problem resolution teaminfrastructures, including access to all application protocols, security • Personalized service and supportattacks, product enhancements, and full service and support. In • Single point of contact for problem resolutionone comprehensive program, you can tap into the resources and • Convenient technical support optionsexpertise you need to keep your simulations current and realistic. • Community and educational resourcesThe ATI Program includes all of the following:Frequent Application Protocol Updates and Data Loss Prevention (DLP) products. These are the EvergreenWith a current ATI Program agreement, you are assured of the Application Protocols supported:most realistic simulation conditions possible with access to the • AOL Messaginglatest applications. The BreakingPoint ATI team uses advanced • AOL Webmailsurveillance techniques and methodologies to identify, capture, • Google Mail (Gmail)and rapidly deliver the emergent business, consumer, and malicious • Google Talkapplications you need to conduct meaningful and thorough • ICQperformance and security validation. • Jabber (XMPP) • MSN MessagingConsistent with BreakingPoint’s all-inclusive approach, your ATI • Windows Live MailProgram account gives you automatic access to all newly releasedprotocols, software fixes, operating system updates, and other • Yahoo! Mailresource downloads. • Yahoo! MessagingEvergreen Application Protocols Updates from the Industry’s Top Security ResearchersContent-aware network and security devices are at a severe Security threats are constantly evolving, with new vulnerabilitiesdisadvantage if they are not tested using the most current versions discovered each day. Your simulation conditions must reflect the latestof the most popular application protocols. The BreakingPoint security threats so that you can ensure your equipment will performEvergreen Applications program addresses this need by providing reliably and protect your infrastructure from the most advanced andever-current versions of popular Web and network applications malicious traffic. Our team of experts does the research for you byfor validating deep packet inspection (DPI), Lawful Intercept (LI), identifying and generating security attacks that meet your needs.