SlideShare a Scribd company logo
BreakingPoint Cost-Effective Testing




Cost-Effective Security and Performance Testing
BreakingPoint Storm CTM™ 4-Port 1GigE Blade Provides Unprecedented Value for Performance
and Security Testing


The BreakingPoint Storm Cyber Tomography Machine (CTM)
is designed to test the performance and security of network
and data center devices and systems in order to harden and
optimize resiliency. The BreakingPoint Storm CTM 4-Port 1GigE
Blade provides the most cost-effective way for any organization
to pinpoint previously impossible-to-detect weaknesses and
vulnerabilities in networks, network devices, and data centers before
they are exploited to wreak havoc within critical IT infrastructures.

The BreakingPoint Storm CTM 4-Port 1GigE Blade
The 4-port 1GigE blade is used in any BreakingPoint CTM 4U chassis
                                                                            •	 Session Sender: Measure connection-processing capabilities
and provides line-speed performance for blended application
                                                                               for security devices.
traffic and live security attacks on all ports. For users who need the
                                                                            •	 Multicast: Create traffic from streaming media and financial
advanced capabilities of blended application traffic, security attacks,
                                                                               services communication protocols.
and live malware but don’t require the blistering performance of
                                                                            •	 Resiliency Score: Measure device performance, security, and
the other BreakingPoint Storm CTM or BreakingPoint FireStorm
                                                                               stability on a scientific, objective basis.
CTM blades, the 4-port 1GigE blade offers the ideal combination of
performance, functionality, and value.                                      •	 Data Center Resiliency Score: Determine user capacity of
                                                                               virtualized servers using real-world applications.

Besides offering 4 ports of authentic line-speed traffic, the 4-port      Enterprises, government agencies and defense contractors, service
1GigE blade can double in port density and performance through a          providers, and network equipment manufacturers rely on the
simple license add-on. Furthermore, as performance requirements           BreakingPoint Storm CTM 4-Port 1GigE Blade to:
evolve, an additional 4- or 8-port 1GigE interface blade or 4-port          •	 Harden network infrastructures by assaulting them with a
10GigE interface blade can be added to the same BreakingPoint                  custom, global, and current blend of stateful applications, live
CTM 4U chassis.                                                                security attacks, and high-stress load to probe every weakness
                                                                               and vulnerability.
Advanced Capabilities and Ease of Use                                       •	 Optimize data center resiliency by simulating the behavior of
BreakingPoint offers the industry’s fastest time-to-test for virtually         millions of users, a crush of real-world applications, and security
any scenario. To help users leverage its extensive performance                 attacks—without deploying racks of servers and costly software.
and security testing capabilities, each BreakingPoint CTM features          •	 Evaluate and select the most appropriate network equipment
an intuitive user interface and dedicated Test Labs for common                 for critical infrastructure with standardized and repeatable
scenarios such as:                                                             product assessments.
  •	 Mobility Testing: Create wireless user behavior, application           •	 Measure and harden the resiliency of routers, switches,
     traffic, and security attacks over 3G and LTE/4G wireless                 firewalls, IPS and UTM devices, and other equipment by
     network protocols.                                                        subjecting them to real-world conditions prior to deployment
  •	 Lawful Intercept/Data Loss Prevention: Validate lawful                    and after patches or reconfiguration.
     intercept and data loss prevention systems with multilingual           •	 Audit and maintain standards compliance throughout the life
     “needle in a haystack” simulation.                                        cycle of network and data center devices.
  •	 RFC 2544: Test against industry standards for packet-forwarding        •	 Analyze the impact of traffic on network devices and systems to
     rates.                                                                    conduct research and train the next generation of security experts.
Comprehensive            World-Class Security                  Unsurpassed Performance
                                                                    Applications             4,500+ Live Security Attacks          Simulates millions of users and
                                                                    150 Applications         27,000 Malware Attacks                blended application traf c at
                                                                    Voice/Video/Media        80+ Evasion Techniques                line speeds on all ports
                                                                    Database                 Complete Microsoft Tuesday Coverage   Scales to unlimited performance
                                                                    Mail/Messaging                                                 levels with multiple chassis
                                                                                                                                   managed via a single interface
                                                                    Microsoft File Service
                                                                    Social Media/Gaming
            >
      >>>



          >>>>>>>>> >>>>>>>>> >>>>>>>>> > >




                                                                                                                                        >>>>
                                                            >>>



BreakingPoint Storm CTM 4-Port 1GigE Blade Features                           Stay Current with Comprehensive Applications, Attacks,
BreakingPoint produces blended applications and the most current              Service, and Support
security attacks at global-scale performance levels while emulating           BreakingPoint also provides the BreakingPoint Application and
millions of users. Each BreakingPoint device:                                 Threat Intelligence (ATI)™ Program, an all-in-one service backed by
  •	 Ships with more than 150 application protocols out of the box,           a team of security researchers and application protocol engineers,
     including popular applications such as AOL® IM, BlackBerry®              to complement the BreakingPoint Storm CTM. This program keeps
     Services, Google® Gmail, FIX, IBM® DB2®, VMware® VMotion™,               BreakingPoint products updated with the latest security attacks and
     HTTP, Microsoft® CIFS/SMB, MAPI, BGP, RIP, Oracle®, Encrypted            applications, as well as new features and performance add-ons.
     BitTorrent™, MSN® Nexus, RADIUS, SIP, Skype™, Windows Live®
     Messenger, World of Warcraft® Yahoo® Mail, Yahoo! Messenger,             About BreakingPoint Systems
     and many others.                                                         BreakingPoint cyber security products are the standard by which
  •	 Provides 4,500+ live security attacks and 28,000+ pieces of              the world’s governments, enterprises, and service providers
     malware—including mobile malware—out of the box, with                    optimize and harden the resiliency of their cyber infrastructures.
     new attacks made available weekly, and the industry’s only               Learn more about BreakingPoint products and services by
     full coverage for Microsoft security updates within 24 hours of
                                                                              contacting a representative in your area.
     announcement.
  •	 Enables sophisticated attack simulation with more than 100
                                                                              1.866.352.6691 U.S. Toll Free
     evasions, botnet-driven distributed denial of service (DDoS)
                                                                              www.breakingpoint.com
     attacks, and more.
  •	 Scales to unlimited performance levels with multiple chassis
     managed via a single interface and configuration, with
     integrated reporting.
BreakingPoint Cost-Effective Testing



  BreakingPoint Storm CTM with 4-Port 1GigE Blade Specifications
  Selected Performance Information                                                             System Configuration and Expansion Options
    •	 4 gigabits per second of stateful application traffic                                     •	 4U chassis with 1 system controller
     •	 7.5 million concurrent flows                                                              •	 Up to 2 interface blades per chassis:
     •	 21,000 SSL transactions per second                                                           •	 1 GigE Interface blade
                                                                                                     •	 4 ports
  BreakingPoint Storm CTM Physical Specifications                                                    •	 SFP interfaces
    •	 Rack Units: 4                                                                                 •	 1 GB of capture buffer per port
     •	 Installed: 17.4 in W x 7 in H x 19.5 in D                                                 •	 Expansion options:
        (44.2 cm W x 17.8 cm H x 49.8 cm D)                                                          •	 1GigE Interface blade (as above)
     •	 Shipping Weight: 45 lb (20.4 kg)                                                                  •	 4-port add-on kit to expand to 8 ports
     •	 Operating Environment: 15° C to 40° C                                                        •	 1GigE Interface blade
     •	 Nonoperating Environment: -20° C to 70° C                                                         •	 8 ports
     •	 Power Requirements: 100 – 240V, 50/60 Hz                                                          •	 SFP interfaces
     •	 Maximum Power Consumption: 1200W                                                                  •	 1 GB of capture buffer per port
     •	 Regulatory Approvals: FCC Class A, CE, EN60950                                               •	 10GigE Interface blade
                                                                                                          •	 4 ports
                                                                                                          •	 XFP interfaces
                                                                                                          •	 2 GB of capture buffer per port




www.breakingpoint.com
© 2005 – 2011. BreakingPoint Systems, Inc. All rights reserved. The BreakingPoint logo is a trademark of BreakingPoint Systems, Inc.
All other trademarks are the property of their respective owners.

More Related Content

What's hot

Measure Network Performance, Security and Stability
Measure Network Performance, Security and StabilityMeasure Network Performance, Security and Stability
Measure Network Performance, Security and Stability
Ixia
 
BreakingPoint Custom Application Toolkit
BreakingPoint Custom Application ToolkitBreakingPoint Custom Application Toolkit
BreakingPoint Custom Application Toolkit
Ixia
 
Breakingpoint Application Threat and Intelligence (ATI) Program
Breakingpoint Application Threat and Intelligence (ATI) ProgramBreakingpoint Application Threat and Intelligence (ATI) Program
Breakingpoint Application Threat and Intelligence (ATI) Program
Ixia
 
IPS Test Methodology
IPS Test MethodologyIPS Test Methodology
IPS Test Methodology
Ixia
 
BreakingPoint & McAfee RSA Conference 2011 Presentation: Data Sheets Lie
BreakingPoint & McAfee RSA Conference 2011 Presentation: Data Sheets LieBreakingPoint & McAfee RSA Conference 2011 Presentation: Data Sheets Lie
BreakingPoint & McAfee RSA Conference 2011 Presentation: Data Sheets Lie
Ixia
 
BreakingPoint & Juniper RSA Conference 2011 Presentation: Evaluating The Juni...
BreakingPoint & Juniper RSA Conference 2011 Presentation: Evaluating The Juni...BreakingPoint & Juniper RSA Conference 2011 Presentation: Evaluating The Juni...
BreakingPoint & Juniper RSA Conference 2011 Presentation: Evaluating The Juni...
Ixia
 
BreakingPoint Cloud and Virtualization Data Sheet
BreakingPoint Cloud and Virtualization Data SheetBreakingPoint Cloud and Virtualization Data Sheet
BreakingPoint Cloud and Virtualization Data Sheet
Ixia
 
The ROI for Early Testing 120816 (Ixia)
The ROI for Early Testing 120816 (Ixia)The ROI for Early Testing 120816 (Ixia)
The ROI for Early Testing 120816 (Ixia)
ixiademandgen
 
F5's IP Intelligence Service
F5's IP Intelligence ServiceF5's IP Intelligence Service
F5's IP Intelligence Service
F5 Networks
 
BreakingPoint & Fortinet RSA Conference 2011 Presentation: Evaluating Enterpr...
BreakingPoint & Fortinet RSA Conference 2011 Presentation: Evaluating Enterpr...BreakingPoint & Fortinet RSA Conference 2011 Presentation: Evaluating Enterpr...
BreakingPoint & Fortinet RSA Conference 2011 Presentation: Evaluating Enterpr...
Ixia
 
Bezpečnostní architektura F5
Bezpečnostní architektura F5Bezpečnostní architektura F5
Bezpečnostní architektura F5
MarketingArrowECS_CZ
 
Symantec Endpoint Suite
Symantec Endpoint SuiteSymantec Endpoint Suite
Symantec Endpoint Suite
MarketingArrowECS_CZ
 
Kerio Control 7 Overview
Kerio Control 7 OverviewKerio Control 7 Overview
Kerio Control 7 Overview
rkoscak
 
Checkpoint Overview
Checkpoint OverviewCheckpoint Overview
Checkpoint Overview
Leonardo Antichi
 
Datasheet Kerio Control
Datasheet Kerio ControlDatasheet Kerio Control
Datasheet Kerio Control
rkoscak
 
ASA Firepower NGFW Update and Deployment Scenarios
ASA Firepower NGFW Update and Deployment ScenariosASA Firepower NGFW Update and Deployment Scenarios
ASA Firepower NGFW Update and Deployment Scenarios
Cisco Canada
 
Dell sonicwall connected security
Dell sonicwall connected securityDell sonicwall connected security
Dell sonicwall connected security
Motty Ben Atia
 
Ngfw overview
Ngfw overviewNgfw overview
Ngfw overview
Motty Ben Atia
 
Sandboxing
SandboxingSandboxing
F5 beyond load balancer (nov 2009)
F5 beyond load balancer (nov 2009)F5 beyond load balancer (nov 2009)
F5 beyond load balancer (nov 2009)
Information Technology
 

What's hot (20)

Measure Network Performance, Security and Stability
Measure Network Performance, Security and StabilityMeasure Network Performance, Security and Stability
Measure Network Performance, Security and Stability
 
BreakingPoint Custom Application Toolkit
BreakingPoint Custom Application ToolkitBreakingPoint Custom Application Toolkit
BreakingPoint Custom Application Toolkit
 
Breakingpoint Application Threat and Intelligence (ATI) Program
Breakingpoint Application Threat and Intelligence (ATI) ProgramBreakingpoint Application Threat and Intelligence (ATI) Program
Breakingpoint Application Threat and Intelligence (ATI) Program
 
IPS Test Methodology
IPS Test MethodologyIPS Test Methodology
IPS Test Methodology
 
BreakingPoint & McAfee RSA Conference 2011 Presentation: Data Sheets Lie
BreakingPoint & McAfee RSA Conference 2011 Presentation: Data Sheets LieBreakingPoint & McAfee RSA Conference 2011 Presentation: Data Sheets Lie
BreakingPoint & McAfee RSA Conference 2011 Presentation: Data Sheets Lie
 
BreakingPoint & Juniper RSA Conference 2011 Presentation: Evaluating The Juni...
BreakingPoint & Juniper RSA Conference 2011 Presentation: Evaluating The Juni...BreakingPoint & Juniper RSA Conference 2011 Presentation: Evaluating The Juni...
BreakingPoint & Juniper RSA Conference 2011 Presentation: Evaluating The Juni...
 
BreakingPoint Cloud and Virtualization Data Sheet
BreakingPoint Cloud and Virtualization Data SheetBreakingPoint Cloud and Virtualization Data Sheet
BreakingPoint Cloud and Virtualization Data Sheet
 
The ROI for Early Testing 120816 (Ixia)
The ROI for Early Testing 120816 (Ixia)The ROI for Early Testing 120816 (Ixia)
The ROI for Early Testing 120816 (Ixia)
 
F5's IP Intelligence Service
F5's IP Intelligence ServiceF5's IP Intelligence Service
F5's IP Intelligence Service
 
BreakingPoint & Fortinet RSA Conference 2011 Presentation: Evaluating Enterpr...
BreakingPoint & Fortinet RSA Conference 2011 Presentation: Evaluating Enterpr...BreakingPoint & Fortinet RSA Conference 2011 Presentation: Evaluating Enterpr...
BreakingPoint & Fortinet RSA Conference 2011 Presentation: Evaluating Enterpr...
 
Bezpečnostní architektura F5
Bezpečnostní architektura F5Bezpečnostní architektura F5
Bezpečnostní architektura F5
 
Symantec Endpoint Suite
Symantec Endpoint SuiteSymantec Endpoint Suite
Symantec Endpoint Suite
 
Kerio Control 7 Overview
Kerio Control 7 OverviewKerio Control 7 Overview
Kerio Control 7 Overview
 
Checkpoint Overview
Checkpoint OverviewCheckpoint Overview
Checkpoint Overview
 
Datasheet Kerio Control
Datasheet Kerio ControlDatasheet Kerio Control
Datasheet Kerio Control
 
ASA Firepower NGFW Update and Deployment Scenarios
ASA Firepower NGFW Update and Deployment ScenariosASA Firepower NGFW Update and Deployment Scenarios
ASA Firepower NGFW Update and Deployment Scenarios
 
Dell sonicwall connected security
Dell sonicwall connected securityDell sonicwall connected security
Dell sonicwall connected security
 
Ngfw overview
Ngfw overviewNgfw overview
Ngfw overview
 
Sandboxing
SandboxingSandboxing
Sandboxing
 
F5 beyond load balancer (nov 2009)
F5 beyond load balancer (nov 2009)F5 beyond load balancer (nov 2009)
F5 beyond load balancer (nov 2009)
 

Similar to BreakingPoint Storm CTM Cost-Effective Testing Solution

LTE Testing - Network Performance, Security, and Stability at Massive Scale
LTE Testing - Network Performance, Security, and Stability at Massive ScaleLTE Testing - Network Performance, Security, and Stability at Massive Scale
LTE Testing - Network Performance, Security, and Stability at Massive Scale
Ixia
 
BreakingPoint Resiliency Score Data Sheet
BreakingPoint Resiliency Score Data SheetBreakingPoint Resiliency Score Data Sheet
BreakingPoint Resiliency Score Data Sheet
Ixia
 
Fadi El Moussa Secure Cloud 2012 V2
Fadi El Moussa Secure Cloud 2012 V2Fadi El Moussa Secure Cloud 2012 V2
Fadi El Moussa Secure Cloud 2012 V2
fadielmoussa
 
Bizhub v care security white paper version 2
Bizhub v care security white paper version 2Bizhub v care security white paper version 2
Bizhub v care security white paper version 2
Barry A. Johnson, Six Sigma Green Belt, CDIA+
 
BreakingPoint от Ixia
BreakingPoint от IxiaBreakingPoint от Ixia
BreakingPoint от Ixia
BAKOTECH
 
Resume | Vijay Navgire
Resume | Vijay Navgire Resume | Vijay Navgire
Resume | Vijay Navgire
Vijay Νavgire
 
Watchguard security proposal 2012
Watchguard security proposal 2012Watchguard security proposal 2012
Watchguard security proposal 2012
Jimmy Saigon
 
Thinking about SDN and whether it is the right approach for your organization?
Thinking about SDN and whether it is the right approach for your organization?Thinking about SDN and whether it is the right approach for your organization?
Thinking about SDN and whether it is the right approach for your organization?
Cisco Canada
 
f5_synthesis_cisco_connect.pdf
f5_synthesis_cisco_connect.pdff5_synthesis_cisco_connect.pdf
f5_synthesis_cisco_connect.pdf
GrigoryShkolnik1
 
IBM Tivoli Endpoint Manager - PCTY 2011
IBM Tivoli Endpoint Manager - PCTY 2011IBM Tivoli Endpoint Manager - PCTY 2011
IBM Tivoli Endpoint Manager - PCTY 2011
IBM Sverige
 
Cyberoam-Brochure
Cyberoam-BrochureCyberoam-Brochure
Cyberoam-Brochure
Baqar Kazmi
 
CyberoamBrochure
CyberoamBrochureCyberoamBrochure
CyberoamBrochure
Baqar Kazmi
 
CyberoamBrochure
CyberoamBrochureCyberoamBrochure
CyberoamBrochure
Baqar kazmi
 
CyberoamBrochure
CyberoamBrochureCyberoamBrochure
CyberoamBrochure
Maliha Ali
 
CyberoamBrochure
CyberoamBrochureCyberoamBrochure
CyberoamBrochure
Maliha Ali
 
CyberoamBrochure
CyberoamBrochureCyberoamBrochure
CyberoamBrochure
bakar kazmi
 
CyberoamBrochure
CyberoamBrochureCyberoamBrochure
CyberoamBrochure
Maliha Ali
 
BT Cloud Enterprise Service Store - Rob Rowlingson
BT Cloud Enterprise Service Store - Rob RowlingsonBT Cloud Enterprise Service Store - Rob Rowlingson
BT Cloud Enterprise Service Store - Rob Rowlingson
Digital Catapult
 
Cr vs fortinet
Cr vs fortinetCr vs fortinet
Cr vs fortinet
gopi123_ipog
 
Comparison Review Forticlient x Kaspersky.pdf
Comparison Review Forticlient x Kaspersky.pdfComparison Review Forticlient x Kaspersky.pdf
Comparison Review Forticlient x Kaspersky.pdf
ImamBahrudin5
 

Similar to BreakingPoint Storm CTM Cost-Effective Testing Solution (20)

LTE Testing - Network Performance, Security, and Stability at Massive Scale
LTE Testing - Network Performance, Security, and Stability at Massive ScaleLTE Testing - Network Performance, Security, and Stability at Massive Scale
LTE Testing - Network Performance, Security, and Stability at Massive Scale
 
BreakingPoint Resiliency Score Data Sheet
BreakingPoint Resiliency Score Data SheetBreakingPoint Resiliency Score Data Sheet
BreakingPoint Resiliency Score Data Sheet
 
Fadi El Moussa Secure Cloud 2012 V2
Fadi El Moussa Secure Cloud 2012 V2Fadi El Moussa Secure Cloud 2012 V2
Fadi El Moussa Secure Cloud 2012 V2
 
Bizhub v care security white paper version 2
Bizhub v care security white paper version 2Bizhub v care security white paper version 2
Bizhub v care security white paper version 2
 
BreakingPoint от Ixia
BreakingPoint от IxiaBreakingPoint от Ixia
BreakingPoint от Ixia
 
Resume | Vijay Navgire
Resume | Vijay Navgire Resume | Vijay Navgire
Resume | Vijay Navgire
 
Watchguard security proposal 2012
Watchguard security proposal 2012Watchguard security proposal 2012
Watchguard security proposal 2012
 
Thinking about SDN and whether it is the right approach for your organization?
Thinking about SDN and whether it is the right approach for your organization?Thinking about SDN and whether it is the right approach for your organization?
Thinking about SDN and whether it is the right approach for your organization?
 
f5_synthesis_cisco_connect.pdf
f5_synthesis_cisco_connect.pdff5_synthesis_cisco_connect.pdf
f5_synthesis_cisco_connect.pdf
 
IBM Tivoli Endpoint Manager - PCTY 2011
IBM Tivoli Endpoint Manager - PCTY 2011IBM Tivoli Endpoint Manager - PCTY 2011
IBM Tivoli Endpoint Manager - PCTY 2011
 
Cyberoam-Brochure
Cyberoam-BrochureCyberoam-Brochure
Cyberoam-Brochure
 
CyberoamBrochure
CyberoamBrochureCyberoamBrochure
CyberoamBrochure
 
CyberoamBrochure
CyberoamBrochureCyberoamBrochure
CyberoamBrochure
 
CyberoamBrochure
CyberoamBrochureCyberoamBrochure
CyberoamBrochure
 
CyberoamBrochure
CyberoamBrochureCyberoamBrochure
CyberoamBrochure
 
CyberoamBrochure
CyberoamBrochureCyberoamBrochure
CyberoamBrochure
 
CyberoamBrochure
CyberoamBrochureCyberoamBrochure
CyberoamBrochure
 
BT Cloud Enterprise Service Store - Rob Rowlingson
BT Cloud Enterprise Service Store - Rob RowlingsonBT Cloud Enterprise Service Store - Rob Rowlingson
BT Cloud Enterprise Service Store - Rob Rowlingson
 
Cr vs fortinet
Cr vs fortinetCr vs fortinet
Cr vs fortinet
 
Comparison Review Forticlient x Kaspersky.pdf
Comparison Review Forticlient x Kaspersky.pdfComparison Review Forticlient x Kaspersky.pdf
Comparison Review Forticlient x Kaspersky.pdf
 

More from Ixia

LTE Testing | 4G Testing
LTE Testing | 4G TestingLTE Testing | 4G Testing
LTE Testing | 4G Testing
Ixia
 
White Paper: Six-Step Competitive Device Evaluation
White Paper: Six-Step Competitive Device EvaluationWhite Paper: Six-Step Competitive Device Evaluation
White Paper: Six-Step Competitive Device Evaluation
Ixia
 
Deep Packet Inspection (DPI) Test Methodology
Deep Packet Inspection (DPI) Test MethodologyDeep Packet Inspection (DPI) Test Methodology
Deep Packet Inspection (DPI) Test Methodology
Ixia
 
Load Test Methodology: Server Load Testing
Load Test Methodology: Server Load TestingLoad Test Methodology: Server Load Testing
Load Test Methodology: Server Load Testing
Ixia
 
IPv6 Test Methodology
IPv6 Test MethodologyIPv6 Test Methodology
IPv6 Test Methodology
Ixia
 
Server Load Balancer Test Methodology
Server Load Balancer Test MethodologyServer Load Balancer Test Methodology
Server Load Balancer Test Methodology
Ixia
 
Catalyst 6500 ASA Service Module
Catalyst 6500 ASA Service ModuleCatalyst 6500 ASA Service Module
Catalyst 6500 ASA Service Module
Ixia
 
Testing High Performance Firewalls
Testing High Performance FirewallsTesting High Performance Firewalls
Testing High Performance Firewalls
Ixia
 
BreakingPoint & Stonesoft RSA Conference 2011 Presentation: Evaluating IPS
BreakingPoint & Stonesoft RSA Conference 2011 Presentation: Evaluating IPSBreakingPoint & Stonesoft RSA Conference 2011 Presentation: Evaluating IPS
BreakingPoint & Stonesoft RSA Conference 2011 Presentation: Evaluating IPS
Ixia
 
Cybersecurity: Arm and Train US Warriors to Win Cyber War
Cybersecurity: Arm and Train US Warriors to Win Cyber WarCybersecurity: Arm and Train US Warriors to Win Cyber War
Cybersecurity: Arm and Train US Warriors to Win Cyber War
Ixia
 
Harden Security Devices Against Increasingly Sophisticated Evasions
Harden Security Devices Against Increasingly Sophisticated EvasionsHarden Security Devices Against Increasingly Sophisticated Evasions
Harden Security Devices Against Increasingly Sophisticated Evasions
Ixia
 

More from Ixia (11)

LTE Testing | 4G Testing
LTE Testing | 4G TestingLTE Testing | 4G Testing
LTE Testing | 4G Testing
 
White Paper: Six-Step Competitive Device Evaluation
White Paper: Six-Step Competitive Device EvaluationWhite Paper: Six-Step Competitive Device Evaluation
White Paper: Six-Step Competitive Device Evaluation
 
Deep Packet Inspection (DPI) Test Methodology
Deep Packet Inspection (DPI) Test MethodologyDeep Packet Inspection (DPI) Test Methodology
Deep Packet Inspection (DPI) Test Methodology
 
Load Test Methodology: Server Load Testing
Load Test Methodology: Server Load TestingLoad Test Methodology: Server Load Testing
Load Test Methodology: Server Load Testing
 
IPv6 Test Methodology
IPv6 Test MethodologyIPv6 Test Methodology
IPv6 Test Methodology
 
Server Load Balancer Test Methodology
Server Load Balancer Test MethodologyServer Load Balancer Test Methodology
Server Load Balancer Test Methodology
 
Catalyst 6500 ASA Service Module
Catalyst 6500 ASA Service ModuleCatalyst 6500 ASA Service Module
Catalyst 6500 ASA Service Module
 
Testing High Performance Firewalls
Testing High Performance FirewallsTesting High Performance Firewalls
Testing High Performance Firewalls
 
BreakingPoint & Stonesoft RSA Conference 2011 Presentation: Evaluating IPS
BreakingPoint & Stonesoft RSA Conference 2011 Presentation: Evaluating IPSBreakingPoint & Stonesoft RSA Conference 2011 Presentation: Evaluating IPS
BreakingPoint & Stonesoft RSA Conference 2011 Presentation: Evaluating IPS
 
Cybersecurity: Arm and Train US Warriors to Win Cyber War
Cybersecurity: Arm and Train US Warriors to Win Cyber WarCybersecurity: Arm and Train US Warriors to Win Cyber War
Cybersecurity: Arm and Train US Warriors to Win Cyber War
 
Harden Security Devices Against Increasingly Sophisticated Evasions
Harden Security Devices Against Increasingly Sophisticated EvasionsHarden Security Devices Against Increasingly Sophisticated Evasions
Harden Security Devices Against Increasingly Sophisticated Evasions
 

Recently uploaded

Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Vladimir Iglovikov, Ph.D.
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
danishmna97
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
Rohit Gautam
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
ThomasParaiso2
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems S.M.S.A.
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
James Anderson
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
Matthew Sinclair
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
Pierluigi Pugliese
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
DianaGray10
 

Recently uploaded (20)

Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
 

BreakingPoint Storm CTM Cost-Effective Testing Solution

  • 1. BreakingPoint Cost-Effective Testing Cost-Effective Security and Performance Testing BreakingPoint Storm CTM™ 4-Port 1GigE Blade Provides Unprecedented Value for Performance and Security Testing The BreakingPoint Storm Cyber Tomography Machine (CTM) is designed to test the performance and security of network and data center devices and systems in order to harden and optimize resiliency. The BreakingPoint Storm CTM 4-Port 1GigE Blade provides the most cost-effective way for any organization to pinpoint previously impossible-to-detect weaknesses and vulnerabilities in networks, network devices, and data centers before they are exploited to wreak havoc within critical IT infrastructures. The BreakingPoint Storm CTM 4-Port 1GigE Blade The 4-port 1GigE blade is used in any BreakingPoint CTM 4U chassis • Session Sender: Measure connection-processing capabilities and provides line-speed performance for blended application for security devices. traffic and live security attacks on all ports. For users who need the • Multicast: Create traffic from streaming media and financial advanced capabilities of blended application traffic, security attacks, services communication protocols. and live malware but don’t require the blistering performance of • Resiliency Score: Measure device performance, security, and the other BreakingPoint Storm CTM or BreakingPoint FireStorm stability on a scientific, objective basis. CTM blades, the 4-port 1GigE blade offers the ideal combination of performance, functionality, and value. • Data Center Resiliency Score: Determine user capacity of virtualized servers using real-world applications. Besides offering 4 ports of authentic line-speed traffic, the 4-port Enterprises, government agencies and defense contractors, service 1GigE blade can double in port density and performance through a providers, and network equipment manufacturers rely on the simple license add-on. Furthermore, as performance requirements BreakingPoint Storm CTM 4-Port 1GigE Blade to: evolve, an additional 4- or 8-port 1GigE interface blade or 4-port • Harden network infrastructures by assaulting them with a 10GigE interface blade can be added to the same BreakingPoint custom, global, and current blend of stateful applications, live CTM 4U chassis. security attacks, and high-stress load to probe every weakness and vulnerability. Advanced Capabilities and Ease of Use • Optimize data center resiliency by simulating the behavior of BreakingPoint offers the industry’s fastest time-to-test for virtually millions of users, a crush of real-world applications, and security any scenario. To help users leverage its extensive performance attacks—without deploying racks of servers and costly software. and security testing capabilities, each BreakingPoint CTM features • Evaluate and select the most appropriate network equipment an intuitive user interface and dedicated Test Labs for common for critical infrastructure with standardized and repeatable scenarios such as: product assessments. • Mobility Testing: Create wireless user behavior, application • Measure and harden the resiliency of routers, switches, traffic, and security attacks over 3G and LTE/4G wireless firewalls, IPS and UTM devices, and other equipment by network protocols. subjecting them to real-world conditions prior to deployment • Lawful Intercept/Data Loss Prevention: Validate lawful and after patches or reconfiguration. intercept and data loss prevention systems with multilingual • Audit and maintain standards compliance throughout the life “needle in a haystack” simulation. cycle of network and data center devices. • RFC 2544: Test against industry standards for packet-forwarding • Analyze the impact of traffic on network devices and systems to rates. conduct research and train the next generation of security experts.
  • 2. Comprehensive World-Class Security Unsurpassed Performance Applications 4,500+ Live Security Attacks Simulates millions of users and 150 Applications 27,000 Malware Attacks blended application traf c at Voice/Video/Media 80+ Evasion Techniques line speeds on all ports Database Complete Microsoft Tuesday Coverage Scales to unlimited performance Mail/Messaging levels with multiple chassis managed via a single interface Microsoft File Service Social Media/Gaming > >>> >>>>>>>>> >>>>>>>>> >>>>>>>>> > > >>>> >>> BreakingPoint Storm CTM 4-Port 1GigE Blade Features Stay Current with Comprehensive Applications, Attacks, BreakingPoint produces blended applications and the most current Service, and Support security attacks at global-scale performance levels while emulating BreakingPoint also provides the BreakingPoint Application and millions of users. Each BreakingPoint device: Threat Intelligence (ATI)™ Program, an all-in-one service backed by • Ships with more than 150 application protocols out of the box, a team of security researchers and application protocol engineers, including popular applications such as AOL® IM, BlackBerry® to complement the BreakingPoint Storm CTM. This program keeps Services, Google® Gmail, FIX, IBM® DB2®, VMware® VMotion™, BreakingPoint products updated with the latest security attacks and HTTP, Microsoft® CIFS/SMB, MAPI, BGP, RIP, Oracle®, Encrypted applications, as well as new features and performance add-ons. BitTorrent™, MSN® Nexus, RADIUS, SIP, Skype™, Windows Live® Messenger, World of Warcraft® Yahoo® Mail, Yahoo! Messenger, About BreakingPoint Systems and many others. BreakingPoint cyber security products are the standard by which • Provides 4,500+ live security attacks and 28,000+ pieces of the world’s governments, enterprises, and service providers malware—including mobile malware—out of the box, with optimize and harden the resiliency of their cyber infrastructures. new attacks made available weekly, and the industry’s only Learn more about BreakingPoint products and services by full coverage for Microsoft security updates within 24 hours of contacting a representative in your area. announcement. • Enables sophisticated attack simulation with more than 100 1.866.352.6691 U.S. Toll Free evasions, botnet-driven distributed denial of service (DDoS) www.breakingpoint.com attacks, and more. • Scales to unlimited performance levels with multiple chassis managed via a single interface and configuration, with integrated reporting.
  • 3. BreakingPoint Cost-Effective Testing BreakingPoint Storm CTM with 4-Port 1GigE Blade Specifications Selected Performance Information System Configuration and Expansion Options • 4 gigabits per second of stateful application traffic • 4U chassis with 1 system controller • 7.5 million concurrent flows • Up to 2 interface blades per chassis: • 21,000 SSL transactions per second • 1 GigE Interface blade • 4 ports BreakingPoint Storm CTM Physical Specifications • SFP interfaces • Rack Units: 4 • 1 GB of capture buffer per port • Installed: 17.4 in W x 7 in H x 19.5 in D • Expansion options: (44.2 cm W x 17.8 cm H x 49.8 cm D) • 1GigE Interface blade (as above) • Shipping Weight: 45 lb (20.4 kg) • 4-port add-on kit to expand to 8 ports • Operating Environment: 15° C to 40° C • 1GigE Interface blade • Nonoperating Environment: -20° C to 70° C • 8 ports • Power Requirements: 100 – 240V, 50/60 Hz • SFP interfaces • Maximum Power Consumption: 1200W • 1 GB of capture buffer per port • Regulatory Approvals: FCC Class A, CE, EN60950 • 10GigE Interface blade • 4 ports • XFP interfaces • 2 GB of capture buffer per port www.breakingpoint.com © 2005 – 2011. BreakingPoint Systems, Inc. All rights reserved. The BreakingPoint logo is a trademark of BreakingPoint Systems, Inc. All other trademarks are the property of their respective owners.