SlideShare a Scribd company logo
BreakingPoint 3G Data Sheet




Test 3G Network Performance, Security, and
Stability at Massive Scale
BreakingPoint CTM™ Products Emulate Millions of Users to Reduce Cost and Complexity of Validating 3G
Wireless Infrastructure


Telecom carriers dealing with the rapidly growing 3G user base              With a BreakingPoint CTM you can:
must test mobile infrastructures efficiently and accurately under
                                                                               • Measure and harden the performance, security, and stability
punishing real-world conditions, without spending a fortune to do
                                                                                 of load balancers, firewalls, IPS devices, and other equipment
so. BreakingPoint CTM products go far beyond the simple functional
                                                                                 with up to 120 gigabits per second of application, attack, and
testing of current 3G validation tools by emulating millions of pieces
                                                                                 malformed traffic.
of user equipment (UE) while transmitting real-world application
                                                                               • Validate network and data center performance by recreating
traffic and security attacks.
                                                                                 more than 150 application protocols, including Twitter Mobile,
BreakingPoint products allow carriers and equipment                              AOL® IM, Yahoo!® Mail and Messenger, Google® Gmail, Skype®,
manufacturers to test 3G networks and devices against the behavior               BitTorrent™, eDonkey, RADIUS, SIP, RTSP, RTP, HTTP, SSL,
of millions of users streaming video, placing calls, purchasing music,           Facebook®, YouTube®, and Apple® FaceTime®, as well as other
or unknowingly sharing the latest malware. A BreakingPoint CTM                   mobile, social, and gaming protocols—with multicast support.
replaces racks of equipment and complicated setup processes with               • Stress network infrastructures with more than 4,500 security
a single-chassis device and a single user interface.                             attacks and 28,000 pieces of malware—including more
                                                                                 than 100 pieces of mobile malware—plus obfuscations and
Unprecedented Performance and Massive Scale in a Cost-
                                                                                 evasions.
Effective Device
                                                                               • Find network problem areas sooner and prepare for the
Based on a patented breakthrough in network processor
                                                                                 unexpected with the industry’s fastest protocol fuzzing
technology and backed by a team of network performance and
                                                                                 capabilities.
security experts, only a BreakingPoint CTM produces the city-scale
3G network conditions needed to harden carrier-grade network                   • Emulate sophisticated, large-scale DDoS and mobile-initiated
resiliency.                                                                      botnet attacks to uncover previously hidden weaknesses.




              For 3G GTP encapsulation, BreakingPoint emulates all elements in this diagram concurrently, or GGSN or SGSN in isolation.
BreakingPoint 3G Data Sheet


  The Solution for Simulating Multi-Million-User 3G Networks,
  with Additional 4G/LTE Capability
  The unique architecture of BreakingPoint CTM products delivers the
  huge performance numbers necessary to validate and harden even
  the largest 3G networks under the most realistic conditions, all from
  a turnkey solution, including:

     • Up to 90 million concurrent TCP sessions, allowing emulation
         of millions of UEs such as smartphones, tablet computers, and
         netbooks.
     • Interactions among the key network elements involved in
         3G communications, including serving GPRS support nodes                               BreakingPoint FireStorm CTM Specifications
         (SGSNs) and gateway GPRS support nodes (GGSNs).                                       A single BreakingPoint FireStorm CTM provides the equivalent
     • A full Dynamic Host Control Protocol (DHCP) network, with                               performance of many racks of servers from a 4U chassis, including:
         support for both DHCP Client and DHCP Server processes.                                   • 120 gigabits per second of blended stateful application traffic
     • Support for both 3G and LTE environments with GTPv1 and                                     • 90 million concurrent TCP sessions
         GTPv2.                                                                                    • 4 million TCP sessions per second

  Technological Breakthroughs from an Easy-to-Use Product                                          • 1.5 million steady-state complete TCP sessions per second
  That Is Always Current                                                                           • 120,000+ SSL sessions per second
  BreakingPoint CTMs are designed for ease of use and rapid                                        • 150+ stateful application protocols
  configuration in a variety of network environments. Because of their                             • 4,500+ live security attacks
  exclusive design, they evolve along with the frequent changes in
                                                                                                   • 28,000+ pieces of malware
  the landscape for applications, attacks, and telecom standards. With
                                                                                                   • 1 Gigabit Ethernet and 10 Gigabit Ethernet interfaces
  a BreakingPoint CTM, you will:
                                                                                               To learn more about all BreakingPoint products and services, visit
     • Receive frequent updates from the BreakingPoint Application                             www.breakingpoint.com/products.
         and Threat Intelligence (ATI) research team, which is dedicated
         to keeping applications and attacks current and providing                             Schedule a Demonstration Today
         frequent feature and performance enhancements.                                        Find out why the world’s largest service providers rely on
     • Employ built-in network traffic profiles—created using                                  BreakingPoint to measure and harden the resiliency of every
         data collected from top global telecom carriers—or easily                             component of their 3G infrastructures. Visit
         customize these profiles to fit your own network’s unique                             www.breakingpoint.com/3G.
         conditions.
                                                                                               1.866.352.6691 U.S. Toll-Free
     • Configure simulations in just minutes through a single user-                            www.breakingpoint.com
         friendly interface that features fully integrated reporting, even
         across multiple BreakingPoint CTMs.
     • Leverage extensive automation and wizard-like labs that
         address many use-case scenarios, including validation of
         Lawful Intercept and data loss prevention (DLP) solutions with
         a digital storm of content in multiple languages.
  Eliminate the complexity of conventional testing approaches
  and replace it with the simplicity, power, and precision of the
  BreakingPoint CTM.




www.breakingpoint.com
© 2005 - 2011. BreakingPoint Systems, Inc. All rights reserved. The BreakingPoint logo is a trademark of BreakingPoint Systems, Inc.
All other trademarks are the property of their respective owners.

More Related Content

What's hot

Kerio Control 7 Overview
Kerio Control 7 OverviewKerio Control 7 Overview
Kerio Control 7 Overviewrkoscak
 
BIG-IP Data Center Firewall Solution
BIG-IP Data Center Firewall SolutionBIG-IP Data Center Firewall Solution
BIG-IP Data Center Firewall SolutionF5 Networks
 
Mitigating Risk for the Mobile Worker: Novell ZENworks Endpoint Security Mana...
Mitigating Risk for the Mobile Worker: Novell ZENworks Endpoint Security Mana...Mitigating Risk for the Mobile Worker: Novell ZENworks Endpoint Security Mana...
Mitigating Risk for the Mobile Worker: Novell ZENworks Endpoint Security Mana...Novell
 
Dell sonicwall connected security
Dell sonicwall connected securityDell sonicwall connected security
Dell sonicwall connected securityMotty Ben Atia
 
The ROI for Early Testing 120816 (Ixia)
The ROI for Early Testing 120816 (Ixia)The ROI for Early Testing 120816 (Ixia)
The ROI for Early Testing 120816 (Ixia)ixiademandgen
 
Thinking about SDN and whether it is the right approach for your organization?
Thinking about SDN and whether it is the right approach for your organization?Thinking about SDN and whether it is the right approach for your organization?
Thinking about SDN and whether it is the right approach for your organization?Cisco Canada
 
Data Sheet: OpenDNS Enterprise Insights
Data Sheet: OpenDNS Enterprise InsightsData Sheet: OpenDNS Enterprise Insights
Data Sheet: OpenDNS Enterprise InsightsCourtland Smith
 
Netflow analyzer- Datasheet
Netflow analyzer- DatasheetNetflow analyzer- Datasheet
Netflow analyzer- DatasheetINSPIRIT BRASIL
 
AGILE SECURITY™ Security for the Real World
AGILE SECURITY™ Security for the Real WorldAGILE SECURITY™ Security for the Real World
AGILE SECURITY™ Security for the Real WorldCisco Russia
 
Intelligent DNS Scale
Intelligent DNS ScaleIntelligent DNS Scale
Intelligent DNS ScalePeter Silva
 
Consider Sophos - Security Made Simple
Consider Sophos - Security Made SimpleConsider Sophos - Security Made Simple
Consider Sophos - Security Made SimpleDavid Fuchs
 
Symantec Virtualization Launch VMworld 2012
Symantec Virtualization Launch VMworld 2012Symantec Virtualization Launch VMworld 2012
Symantec Virtualization Launch VMworld 2012Symantec
 

What's hot (20)

Air defense ap_test_spec_sheet
Air defense ap_test_spec_sheetAir defense ap_test_spec_sheet
Air defense ap_test_spec_sheet
 
Checkpoint Overview
Checkpoint OverviewCheckpoint Overview
Checkpoint Overview
 
Kerio Control 7 Overview
Kerio Control 7 OverviewKerio Control 7 Overview
Kerio Control 7 Overview
 
BIG-IP Data Center Firewall Solution
BIG-IP Data Center Firewall SolutionBIG-IP Data Center Firewall Solution
BIG-IP Data Center Firewall Solution
 
Mitigating Risk for the Mobile Worker: Novell ZENworks Endpoint Security Mana...
Mitigating Risk for the Mobile Worker: Novell ZENworks Endpoint Security Mana...Mitigating Risk for the Mobile Worker: Novell ZENworks Endpoint Security Mana...
Mitigating Risk for the Mobile Worker: Novell ZENworks Endpoint Security Mana...
 
Ngfw overview
Ngfw overviewNgfw overview
Ngfw overview
 
Symantec Endpoint Suite
Symantec Endpoint SuiteSymantec Endpoint Suite
Symantec Endpoint Suite
 
Fore scout nac-datasheet
Fore scout nac-datasheetFore scout nac-datasheet
Fore scout nac-datasheet
 
Dell sonicwall connected security
Dell sonicwall connected securityDell sonicwall connected security
Dell sonicwall connected security
 
The ROI for Early Testing 120816 (Ixia)
The ROI for Early Testing 120816 (Ixia)The ROI for Early Testing 120816 (Ixia)
The ROI for Early Testing 120816 (Ixia)
 
Is the Network Tap Mightier Than the Sword
Is the Network Tap Mightier Than the SwordIs the Network Tap Mightier Than the Sword
Is the Network Tap Mightier Than the Sword
 
Thinking about SDN and whether it is the right approach for your organization?
Thinking about SDN and whether it is the right approach for your organization?Thinking about SDN and whether it is the right approach for your organization?
Thinking about SDN and whether it is the right approach for your organization?
 
checkpoint
checkpointcheckpoint
checkpoint
 
Data Sheet: OpenDNS Enterprise Insights
Data Sheet: OpenDNS Enterprise InsightsData Sheet: OpenDNS Enterprise Insights
Data Sheet: OpenDNS Enterprise Insights
 
F5 beyond load balancer (nov 2009)
F5 beyond load balancer (nov 2009)F5 beyond load balancer (nov 2009)
F5 beyond load balancer (nov 2009)
 
Netflow analyzer- Datasheet
Netflow analyzer- DatasheetNetflow analyzer- Datasheet
Netflow analyzer- Datasheet
 
AGILE SECURITY™ Security for the Real World
AGILE SECURITY™ Security for the Real WorldAGILE SECURITY™ Security for the Real World
AGILE SECURITY™ Security for the Real World
 
Intelligent DNS Scale
Intelligent DNS ScaleIntelligent DNS Scale
Intelligent DNS Scale
 
Consider Sophos - Security Made Simple
Consider Sophos - Security Made SimpleConsider Sophos - Security Made Simple
Consider Sophos - Security Made Simple
 
Symantec Virtualization Launch VMworld 2012
Symantec Virtualization Launch VMworld 2012Symantec Virtualization Launch VMworld 2012
Symantec Virtualization Launch VMworld 2012
 

Similar to BreakingPoint 3G Testing Data Sheet

BreakingPoint Resiliency Score Data Sheet
BreakingPoint Resiliency Score Data SheetBreakingPoint Resiliency Score Data Sheet
BreakingPoint Resiliency Score Data SheetIxia
 
Zero Trust for Private 5G and Edge
Zero Trust for Private 5G and EdgeZero Trust for Private 5G and Edge
Zero Trust for Private 5G and EdgeRebekah Rodriguez
 
Transforming Private 5G Networks
Transforming Private 5G NetworksTransforming Private 5G Networks
Transforming Private 5G Networksinside-BigData.com
 
5G Multi-Access Edge Compute
5G Multi-Access Edge Compute5G Multi-Access Edge Compute
5G Multi-Access Edge ComputeMichelle Holley
 
Ecom CN70X ATEX Certified Hazardous Area PDA (Mobile Computer) Datasheet
Ecom CN70X ATEX Certified Hazardous Area PDA (Mobile Computer) DatasheetEcom CN70X ATEX Certified Hazardous Area PDA (Mobile Computer) Datasheet
Ecom CN70X ATEX Certified Hazardous Area PDA (Mobile Computer) DatasheetThorne & Derrick International
 
BreakingPoint от Ixia
BreakingPoint от IxiaBreakingPoint от Ixia
BreakingPoint от IxiaBAKOTECH
 
Re-Imagining the Data Center with Intel
Re-Imagining the Data Center with IntelRe-Imagining the Data Center with Intel
Re-Imagining the Data Center with IntelIntel IT Center
 
TechWiseTV Workshop: Cisco Catalyst 9800 Series Wireless Controller
TechWiseTV Workshop: Cisco Catalyst 9800 Series Wireless ControllerTechWiseTV Workshop: Cisco Catalyst 9800 Series Wireless Controller
TechWiseTV Workshop: Cisco Catalyst 9800 Series Wireless ControllerRobb Boyd
 
SoftLayer & Ingram Micro: A Winning Combination for Partners
SoftLayer & Ingram Micro: A Winning Combination for PartnersSoftLayer & Ingram Micro: A Winning Combination for Partners
SoftLayer & Ingram Micro: A Winning Combination for PartnersIngram Micro Cloud
 
Acceleration_and_Security_draft_v2
Acceleration_and_Security_draft_v2Acceleration_and_Security_draft_v2
Acceleration_and_Security_draft_v2Srinivasa Addepalli
 
Mastering IoT Design: Sense, Process, Connect: Processing: Turning IoT Data i...
Mastering IoT Design: Sense, Process, Connect: Processing: Turning IoT Data i...Mastering IoT Design: Sense, Process, Connect: Processing: Turning IoT Data i...
Mastering IoT Design: Sense, Process, Connect: Processing: Turning IoT Data i...Deepak Shankar
 
Building Efficient Edge Nodes for Content Delivery Networks
Building Efficient Edge Nodes for Content Delivery NetworksBuilding Efficient Edge Nodes for Content Delivery Networks
Building Efficient Edge Nodes for Content Delivery NetworksRebekah Rodriguez
 
Transformation From Today To Tomorrow - Market and Product Strategy 2018
Transformation From Today To Tomorrow - Market and Product Strategy 2018Transformation From Today To Tomorrow - Market and Product Strategy 2018
Transformation From Today To Tomorrow - Market and Product Strategy 2018Jiunn-Jer Sun
 
Ecom CK7X ATEX Certified Hazardous Area PDA (Mobile Computer) Datasheet
Ecom CK7X ATEX Certified Hazardous Area PDA (Mobile Computer) DatasheetEcom CK7X ATEX Certified Hazardous Area PDA (Mobile Computer) Datasheet
Ecom CK7X ATEX Certified Hazardous Area PDA (Mobile Computer) DatasheetThorne & Derrick International
 
2017 - LISA - LinkedIn's Distributed Firewall (DFW)
2017 - LISA - LinkedIn's Distributed Firewall (DFW)2017 - LISA - LinkedIn's Distributed Firewall (DFW)
2017 - LISA - LinkedIn's Distributed Firewall (DFW)Mike Svoboda
 
2596 - Integrating PureApplication System Into Your Network
2596 - Integrating PureApplication System Into Your Network2596 - Integrating PureApplication System Into Your Network
2596 - Integrating PureApplication System Into Your NetworkHendrik van Run
 
How Network Instruments can help you!
How Network Instruments can help you!How Network Instruments can help you!
How Network Instruments can help you!Tonya Williams
 
Revolutionizing IoT Testing - A Sneak Peek of HiveMQ Swarm
Revolutionizing IoT Testing - A Sneak Peek of HiveMQ SwarmRevolutionizing IoT Testing - A Sneak Peek of HiveMQ Swarm
Revolutionizing IoT Testing - A Sneak Peek of HiveMQ SwarmHiveMQ
 
Network Vision Sprint Direct Connect
Network Vision   Sprint Direct ConnectNetwork Vision   Sprint Direct Connect
Network Vision Sprint Direct Connectudiazdeleon
 
VMworld 2013: Network Function Virtualization in the Cloud: Case for Enterpri...
VMworld 2013: Network Function Virtualization in the Cloud: Case for Enterpri...VMworld 2013: Network Function Virtualization in the Cloud: Case for Enterpri...
VMworld 2013: Network Function Virtualization in the Cloud: Case for Enterpri...VMworld
 

Similar to BreakingPoint 3G Testing Data Sheet (20)

BreakingPoint Resiliency Score Data Sheet
BreakingPoint Resiliency Score Data SheetBreakingPoint Resiliency Score Data Sheet
BreakingPoint Resiliency Score Data Sheet
 
Zero Trust for Private 5G and Edge
Zero Trust for Private 5G and EdgeZero Trust for Private 5G and Edge
Zero Trust for Private 5G and Edge
 
Transforming Private 5G Networks
Transforming Private 5G NetworksTransforming Private 5G Networks
Transforming Private 5G Networks
 
5G Multi-Access Edge Compute
5G Multi-Access Edge Compute5G Multi-Access Edge Compute
5G Multi-Access Edge Compute
 
Ecom CN70X ATEX Certified Hazardous Area PDA (Mobile Computer) Datasheet
Ecom CN70X ATEX Certified Hazardous Area PDA (Mobile Computer) DatasheetEcom CN70X ATEX Certified Hazardous Area PDA (Mobile Computer) Datasheet
Ecom CN70X ATEX Certified Hazardous Area PDA (Mobile Computer) Datasheet
 
BreakingPoint от Ixia
BreakingPoint от IxiaBreakingPoint от Ixia
BreakingPoint от Ixia
 
Re-Imagining the Data Center with Intel
Re-Imagining the Data Center with IntelRe-Imagining the Data Center with Intel
Re-Imagining the Data Center with Intel
 
TechWiseTV Workshop: Cisco Catalyst 9800 Series Wireless Controller
TechWiseTV Workshop: Cisco Catalyst 9800 Series Wireless ControllerTechWiseTV Workshop: Cisco Catalyst 9800 Series Wireless Controller
TechWiseTV Workshop: Cisco Catalyst 9800 Series Wireless Controller
 
SoftLayer & Ingram Micro: A Winning Combination for Partners
SoftLayer & Ingram Micro: A Winning Combination for PartnersSoftLayer & Ingram Micro: A Winning Combination for Partners
SoftLayer & Ingram Micro: A Winning Combination for Partners
 
Acceleration_and_Security_draft_v2
Acceleration_and_Security_draft_v2Acceleration_and_Security_draft_v2
Acceleration_and_Security_draft_v2
 
Mastering IoT Design: Sense, Process, Connect: Processing: Turning IoT Data i...
Mastering IoT Design: Sense, Process, Connect: Processing: Turning IoT Data i...Mastering IoT Design: Sense, Process, Connect: Processing: Turning IoT Data i...
Mastering IoT Design: Sense, Process, Connect: Processing: Turning IoT Data i...
 
Building Efficient Edge Nodes for Content Delivery Networks
Building Efficient Edge Nodes for Content Delivery NetworksBuilding Efficient Edge Nodes for Content Delivery Networks
Building Efficient Edge Nodes for Content Delivery Networks
 
Transformation From Today To Tomorrow - Market and Product Strategy 2018
Transformation From Today To Tomorrow - Market and Product Strategy 2018Transformation From Today To Tomorrow - Market and Product Strategy 2018
Transformation From Today To Tomorrow - Market and Product Strategy 2018
 
Ecom CK7X ATEX Certified Hazardous Area PDA (Mobile Computer) Datasheet
Ecom CK7X ATEX Certified Hazardous Area PDA (Mobile Computer) DatasheetEcom CK7X ATEX Certified Hazardous Area PDA (Mobile Computer) Datasheet
Ecom CK7X ATEX Certified Hazardous Area PDA (Mobile Computer) Datasheet
 
2017 - LISA - LinkedIn's Distributed Firewall (DFW)
2017 - LISA - LinkedIn's Distributed Firewall (DFW)2017 - LISA - LinkedIn's Distributed Firewall (DFW)
2017 - LISA - LinkedIn's Distributed Firewall (DFW)
 
2596 - Integrating PureApplication System Into Your Network
2596 - Integrating PureApplication System Into Your Network2596 - Integrating PureApplication System Into Your Network
2596 - Integrating PureApplication System Into Your Network
 
How Network Instruments can help you!
How Network Instruments can help you!How Network Instruments can help you!
How Network Instruments can help you!
 
Revolutionizing IoT Testing - A Sneak Peek of HiveMQ Swarm
Revolutionizing IoT Testing - A Sneak Peek of HiveMQ SwarmRevolutionizing IoT Testing - A Sneak Peek of HiveMQ Swarm
Revolutionizing IoT Testing - A Sneak Peek of HiveMQ Swarm
 
Network Vision Sprint Direct Connect
Network Vision   Sprint Direct ConnectNetwork Vision   Sprint Direct Connect
Network Vision Sprint Direct Connect
 
VMworld 2013: Network Function Virtualization in the Cloud: Case for Enterpri...
VMworld 2013: Network Function Virtualization in the Cloud: Case for Enterpri...VMworld 2013: Network Function Virtualization in the Cloud: Case for Enterpri...
VMworld 2013: Network Function Virtualization in the Cloud: Case for Enterpri...
 

More from Ixia

Measuring Private Cloud Resiliency
Measuring Private Cloud ResiliencyMeasuring Private Cloud Resiliency
Measuring Private Cloud ResiliencyIxia
 
LTE Testing | 4G Testing
LTE Testing | 4G TestingLTE Testing | 4G Testing
LTE Testing | 4G TestingIxia
 
White Paper: Six-Step Competitive Device Evaluation
White Paper: Six-Step Competitive Device EvaluationWhite Paper: Six-Step Competitive Device Evaluation
White Paper: Six-Step Competitive Device EvaluationIxia
 
IPS Test Methodology
IPS Test MethodologyIPS Test Methodology
IPS Test MethodologyIxia
 
Deep Packet Inspection (DPI) Test Methodology
Deep Packet Inspection (DPI) Test MethodologyDeep Packet Inspection (DPI) Test Methodology
Deep Packet Inspection (DPI) Test MethodologyIxia
 
Load Test Methodology: Server Load Testing
Load Test Methodology: Server Load TestingLoad Test Methodology: Server Load Testing
Load Test Methodology: Server Load TestingIxia
 
IPv6 Test Methodology
IPv6 Test MethodologyIPv6 Test Methodology
IPv6 Test MethodologyIxia
 
Server Load Balancer Test Methodology
Server Load Balancer Test MethodologyServer Load Balancer Test Methodology
Server Load Balancer Test MethodologyIxia
 
How to Test High-Performance Next-Generation Firewalls
How to Test High-Performance Next-Generation FirewallsHow to Test High-Performance Next-Generation Firewalls
How to Test High-Performance Next-Generation FirewallsIxia
 
Catalyst 6500 ASA Service Module
Catalyst 6500 ASA Service ModuleCatalyst 6500 ASA Service Module
Catalyst 6500 ASA Service ModuleIxia
 
Testing High Performance Firewalls
Testing High Performance FirewallsTesting High Performance Firewalls
Testing High Performance FirewallsIxia
 
BreakingPoint & Fortinet RSA Conference 2011 Presentation: Evaluating Enterpr...
BreakingPoint & Fortinet RSA Conference 2011 Presentation: Evaluating Enterpr...BreakingPoint & Fortinet RSA Conference 2011 Presentation: Evaluating Enterpr...
BreakingPoint & Fortinet RSA Conference 2011 Presentation: Evaluating Enterpr...Ixia
 
BreakingPoint & Juniper RSA Conference 2011 Presentation: Securing the High P...
BreakingPoint & Juniper RSA Conference 2011 Presentation: Securing the High P...BreakingPoint & Juniper RSA Conference 2011 Presentation: Securing the High P...
BreakingPoint & Juniper RSA Conference 2011 Presentation: Securing the High P...Ixia
 
BreakingPoint & Stonesoft RSA Conference 2011 Presentation: Evaluating IPS
BreakingPoint & Stonesoft RSA Conference 2011 Presentation: Evaluating IPSBreakingPoint & Stonesoft RSA Conference 2011 Presentation: Evaluating IPS
BreakingPoint & Stonesoft RSA Conference 2011 Presentation: Evaluating IPSIxia
 
BreakingPoint & Juniper RSA Conference 2011 Presentation: Evaluating The Juni...
BreakingPoint & Juniper RSA Conference 2011 Presentation: Evaluating The Juni...BreakingPoint & Juniper RSA Conference 2011 Presentation: Evaluating The Juni...
BreakingPoint & Juniper RSA Conference 2011 Presentation: Evaluating The Juni...Ixia
 
BreakingPoint & Crossbeam RSA Conference 2011 Presentation: Evaluating High P...
BreakingPoint & Crossbeam RSA Conference 2011 Presentation: Evaluating High P...BreakingPoint & Crossbeam RSA Conference 2011 Presentation: Evaluating High P...
BreakingPoint & Crossbeam RSA Conference 2011 Presentation: Evaluating High P...Ixia
 
BreakingPoint & McAfee RSA Conference 2011 Presentation: Data Sheets Lie
BreakingPoint & McAfee RSA Conference 2011 Presentation: Data Sheets LieBreakingPoint & McAfee RSA Conference 2011 Presentation: Data Sheets Lie
BreakingPoint & McAfee RSA Conference 2011 Presentation: Data Sheets LieIxia
 
Cybersecurity: Arm and Train US Warriors to Win Cyber War
Cybersecurity: Arm and Train US Warriors to Win Cyber WarCybersecurity: Arm and Train US Warriors to Win Cyber War
Cybersecurity: Arm and Train US Warriors to Win Cyber WarIxia
 
Firewall Testing Methodology
Firewall Testing MethodologyFirewall Testing Methodology
Firewall Testing MethodologyIxia
 
Measure Network Performance, Security and Stability
Measure Network Performance, Security and StabilityMeasure Network Performance, Security and Stability
Measure Network Performance, Security and StabilityIxia
 

More from Ixia (20)

Measuring Private Cloud Resiliency
Measuring Private Cloud ResiliencyMeasuring Private Cloud Resiliency
Measuring Private Cloud Resiliency
 
LTE Testing | 4G Testing
LTE Testing | 4G TestingLTE Testing | 4G Testing
LTE Testing | 4G Testing
 
White Paper: Six-Step Competitive Device Evaluation
White Paper: Six-Step Competitive Device EvaluationWhite Paper: Six-Step Competitive Device Evaluation
White Paper: Six-Step Competitive Device Evaluation
 
IPS Test Methodology
IPS Test MethodologyIPS Test Methodology
IPS Test Methodology
 
Deep Packet Inspection (DPI) Test Methodology
Deep Packet Inspection (DPI) Test MethodologyDeep Packet Inspection (DPI) Test Methodology
Deep Packet Inspection (DPI) Test Methodology
 
Load Test Methodology: Server Load Testing
Load Test Methodology: Server Load TestingLoad Test Methodology: Server Load Testing
Load Test Methodology: Server Load Testing
 
IPv6 Test Methodology
IPv6 Test MethodologyIPv6 Test Methodology
IPv6 Test Methodology
 
Server Load Balancer Test Methodology
Server Load Balancer Test MethodologyServer Load Balancer Test Methodology
Server Load Balancer Test Methodology
 
How to Test High-Performance Next-Generation Firewalls
How to Test High-Performance Next-Generation FirewallsHow to Test High-Performance Next-Generation Firewalls
How to Test High-Performance Next-Generation Firewalls
 
Catalyst 6500 ASA Service Module
Catalyst 6500 ASA Service ModuleCatalyst 6500 ASA Service Module
Catalyst 6500 ASA Service Module
 
Testing High Performance Firewalls
Testing High Performance FirewallsTesting High Performance Firewalls
Testing High Performance Firewalls
 
BreakingPoint & Fortinet RSA Conference 2011 Presentation: Evaluating Enterpr...
BreakingPoint & Fortinet RSA Conference 2011 Presentation: Evaluating Enterpr...BreakingPoint & Fortinet RSA Conference 2011 Presentation: Evaluating Enterpr...
BreakingPoint & Fortinet RSA Conference 2011 Presentation: Evaluating Enterpr...
 
BreakingPoint & Juniper RSA Conference 2011 Presentation: Securing the High P...
BreakingPoint & Juniper RSA Conference 2011 Presentation: Securing the High P...BreakingPoint & Juniper RSA Conference 2011 Presentation: Securing the High P...
BreakingPoint & Juniper RSA Conference 2011 Presentation: Securing the High P...
 
BreakingPoint & Stonesoft RSA Conference 2011 Presentation: Evaluating IPS
BreakingPoint & Stonesoft RSA Conference 2011 Presentation: Evaluating IPSBreakingPoint & Stonesoft RSA Conference 2011 Presentation: Evaluating IPS
BreakingPoint & Stonesoft RSA Conference 2011 Presentation: Evaluating IPS
 
BreakingPoint & Juniper RSA Conference 2011 Presentation: Evaluating The Juni...
BreakingPoint & Juniper RSA Conference 2011 Presentation: Evaluating The Juni...BreakingPoint & Juniper RSA Conference 2011 Presentation: Evaluating The Juni...
BreakingPoint & Juniper RSA Conference 2011 Presentation: Evaluating The Juni...
 
BreakingPoint & Crossbeam RSA Conference 2011 Presentation: Evaluating High P...
BreakingPoint & Crossbeam RSA Conference 2011 Presentation: Evaluating High P...BreakingPoint & Crossbeam RSA Conference 2011 Presentation: Evaluating High P...
BreakingPoint & Crossbeam RSA Conference 2011 Presentation: Evaluating High P...
 
BreakingPoint & McAfee RSA Conference 2011 Presentation: Data Sheets Lie
BreakingPoint & McAfee RSA Conference 2011 Presentation: Data Sheets LieBreakingPoint & McAfee RSA Conference 2011 Presentation: Data Sheets Lie
BreakingPoint & McAfee RSA Conference 2011 Presentation: Data Sheets Lie
 
Cybersecurity: Arm and Train US Warriors to Win Cyber War
Cybersecurity: Arm and Train US Warriors to Win Cyber WarCybersecurity: Arm and Train US Warriors to Win Cyber War
Cybersecurity: Arm and Train US Warriors to Win Cyber War
 
Firewall Testing Methodology
Firewall Testing MethodologyFirewall Testing Methodology
Firewall Testing Methodology
 
Measure Network Performance, Security and Stability
Measure Network Performance, Security and StabilityMeasure Network Performance, Security and Stability
Measure Network Performance, Security and Stability
 

Recently uploaded

"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor TurskyiFwdays
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...Sri Ambati
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaRTTS
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...Product School
 
НАДІЯ ФЕДЮШКО БАЦ «Професійне зростання QA спеціаліста»
НАДІЯ ФЕДЮШКО БАЦ  «Професійне зростання QA спеціаліста»НАДІЯ ФЕДЮШКО БАЦ  «Професійне зростання QA спеціаліста»
НАДІЯ ФЕДЮШКО БАЦ «Професійне зростання QA спеціаліста»QADay
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform EngineeringJemma Hussein Allen
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesThousandEyes
 
Quantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIsQuantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIsVlad Stirbu
 
Speed Wins: From Kafka to APIs in Minutes
Speed Wins: From Kafka to APIs in MinutesSpeed Wins: From Kafka to APIs in Minutes
Speed Wins: From Kafka to APIs in Minutesconfluent
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Frank van Harmelen
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
 
IoT Analytics Company Presentation May 2024
IoT Analytics Company Presentation May 2024IoT Analytics Company Presentation May 2024
IoT Analytics Company Presentation May 2024IoTAnalytics
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Alison B. Lowndes
 
Demystifying gRPC in .Net by John Staveley
Demystifying gRPC in .Net by John StaveleyDemystifying gRPC in .Net by John Staveley
Demystifying gRPC in .Net by John StaveleyJohn Staveley
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Thierry Lestable
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxAbida Shariff
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...Elena Simperl
 

Recently uploaded (20)

"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
НАДІЯ ФЕДЮШКО БАЦ «Професійне зростання QA спеціаліста»
НАДІЯ ФЕДЮШКО БАЦ  «Професійне зростання QA спеціаліста»НАДІЯ ФЕДЮШКО БАЦ  «Професійне зростання QA спеціаліста»
НАДІЯ ФЕДЮШКО БАЦ «Професійне зростання QA спеціаліста»
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
Quantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIsQuantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIs
 
Speed Wins: From Kafka to APIs in Minutes
Speed Wins: From Kafka to APIs in MinutesSpeed Wins: From Kafka to APIs in Minutes
Speed Wins: From Kafka to APIs in Minutes
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
IoT Analytics Company Presentation May 2024
IoT Analytics Company Presentation May 2024IoT Analytics Company Presentation May 2024
IoT Analytics Company Presentation May 2024
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
Demystifying gRPC in .Net by John Staveley
Demystifying gRPC in .Net by John StaveleyDemystifying gRPC in .Net by John Staveley
Demystifying gRPC in .Net by John Staveley
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 

BreakingPoint 3G Testing Data Sheet

  • 1. BreakingPoint 3G Data Sheet Test 3G Network Performance, Security, and Stability at Massive Scale BreakingPoint CTM™ Products Emulate Millions of Users to Reduce Cost and Complexity of Validating 3G Wireless Infrastructure Telecom carriers dealing with the rapidly growing 3G user base With a BreakingPoint CTM you can: must test mobile infrastructures efficiently and accurately under • Measure and harden the performance, security, and stability punishing real-world conditions, without spending a fortune to do of load balancers, firewalls, IPS devices, and other equipment so. BreakingPoint CTM products go far beyond the simple functional with up to 120 gigabits per second of application, attack, and testing of current 3G validation tools by emulating millions of pieces malformed traffic. of user equipment (UE) while transmitting real-world application • Validate network and data center performance by recreating traffic and security attacks. more than 150 application protocols, including Twitter Mobile, BreakingPoint products allow carriers and equipment AOL® IM, Yahoo!® Mail and Messenger, Google® Gmail, Skype®, manufacturers to test 3G networks and devices against the behavior BitTorrent™, eDonkey, RADIUS, SIP, RTSP, RTP, HTTP, SSL, of millions of users streaming video, placing calls, purchasing music, Facebook®, YouTube®, and Apple® FaceTime®, as well as other or unknowingly sharing the latest malware. A BreakingPoint CTM mobile, social, and gaming protocols—with multicast support. replaces racks of equipment and complicated setup processes with • Stress network infrastructures with more than 4,500 security a single-chassis device and a single user interface. attacks and 28,000 pieces of malware—including more than 100 pieces of mobile malware—plus obfuscations and Unprecedented Performance and Massive Scale in a Cost- evasions. Effective Device • Find network problem areas sooner and prepare for the Based on a patented breakthrough in network processor unexpected with the industry’s fastest protocol fuzzing technology and backed by a team of network performance and capabilities. security experts, only a BreakingPoint CTM produces the city-scale 3G network conditions needed to harden carrier-grade network • Emulate sophisticated, large-scale DDoS and mobile-initiated resiliency. botnet attacks to uncover previously hidden weaknesses. For 3G GTP encapsulation, BreakingPoint emulates all elements in this diagram concurrently, or GGSN or SGSN in isolation.
  • 2. BreakingPoint 3G Data Sheet The Solution for Simulating Multi-Million-User 3G Networks, with Additional 4G/LTE Capability The unique architecture of BreakingPoint CTM products delivers the huge performance numbers necessary to validate and harden even the largest 3G networks under the most realistic conditions, all from a turnkey solution, including: • Up to 90 million concurrent TCP sessions, allowing emulation of millions of UEs such as smartphones, tablet computers, and netbooks. • Interactions among the key network elements involved in 3G communications, including serving GPRS support nodes BreakingPoint FireStorm CTM Specifications (SGSNs) and gateway GPRS support nodes (GGSNs). A single BreakingPoint FireStorm CTM provides the equivalent • A full Dynamic Host Control Protocol (DHCP) network, with performance of many racks of servers from a 4U chassis, including: support for both DHCP Client and DHCP Server processes. • 120 gigabits per second of blended stateful application traffic • Support for both 3G and LTE environments with GTPv1 and • 90 million concurrent TCP sessions GTPv2. • 4 million TCP sessions per second Technological Breakthroughs from an Easy-to-Use Product • 1.5 million steady-state complete TCP sessions per second That Is Always Current • 120,000+ SSL sessions per second BreakingPoint CTMs are designed for ease of use and rapid • 150+ stateful application protocols configuration in a variety of network environments. Because of their • 4,500+ live security attacks exclusive design, they evolve along with the frequent changes in • 28,000+ pieces of malware the landscape for applications, attacks, and telecom standards. With • 1 Gigabit Ethernet and 10 Gigabit Ethernet interfaces a BreakingPoint CTM, you will: To learn more about all BreakingPoint products and services, visit • Receive frequent updates from the BreakingPoint Application www.breakingpoint.com/products. and Threat Intelligence (ATI) research team, which is dedicated to keeping applications and attacks current and providing Schedule a Demonstration Today frequent feature and performance enhancements. Find out why the world’s largest service providers rely on • Employ built-in network traffic profiles—created using BreakingPoint to measure and harden the resiliency of every data collected from top global telecom carriers—or easily component of their 3G infrastructures. Visit customize these profiles to fit your own network’s unique www.breakingpoint.com/3G. conditions. 1.866.352.6691 U.S. Toll-Free • Configure simulations in just minutes through a single user- www.breakingpoint.com friendly interface that features fully integrated reporting, even across multiple BreakingPoint CTMs. • Leverage extensive automation and wizard-like labs that address many use-case scenarios, including validation of Lawful Intercept and data loss prevention (DLP) solutions with a digital storm of content in multiple languages. Eliminate the complexity of conventional testing approaches and replace it with the simplicity, power, and precision of the BreakingPoint CTM. www.breakingpoint.com © 2005 - 2011. BreakingPoint Systems, Inc. All rights reserved. The BreakingPoint logo is a trademark of BreakingPoint Systems, Inc. All other trademarks are the property of their respective owners.