The document summarizes the BreakingPoint Storm CTM 4-Port 1GigE Blade, which provides a cost-effective way for organizations to test the performance and security of their networks. It can generate real-world application traffic and security attacks at line speeds on all four of its ports. While offering high throughput, it has a more affordable price point than other BreakingPoint blades. The blade can be expanded through additional license or interface blades to meet evolving testing needs.
1. BreakingPoint Cost-Effective Testing
Cost-Effective Security and Performance Testing
BreakingPoint Storm CTM™ 4-Port 1GigE Blade Provides Unprecedented Value for Performance
and Security Testing
The BreakingPoint Storm Cyber Tomography Machine (CTM)
is designed to test the performance and security of network
and data center devices and systems in order to harden and
optimize resiliency. The BreakingPoint Storm CTM 4-Port 1GigE
Blade provides the most cost-effective way for any organization
to pinpoint previously impossible-to-detect weaknesses and
vulnerabilities in networks, network devices, and data centers before
they are exploited to wreak havoc within critical IT infrastructures.
The BreakingPoint Storm CTM 4-Port 1GigE Blade
The 4-port 1GigE blade is used in any BreakingPoint CTM 4U chassis
• Session Sender: Measure connection-processing capabilities
and provides line-speed performance for blended application
for security devices.
traffic and live security attacks on all ports. For users who need the
• Multicast: Create traffic from streaming media and financial
advanced capabilities of blended application traffic, security attacks,
services communication protocols.
and live malware but don’t require the blistering performance of
• Resiliency Score: Measure device performance, security, and
the other BreakingPoint Storm CTM or BreakingPoint FireStorm
stability on a scientific, objective basis.
CTM blades, the 4-port 1GigE blade offers the ideal combination of
performance, functionality, and value. • Data Center Resiliency Score: Determine user capacity of
virtualized servers using real-world applications.
Besides offering 4 ports of authentic line-speed traffic, the 4-port Enterprises, government agencies and defense contractors, service
1GigE blade can double in port density and performance through a providers, and network equipment manufacturers rely on the
simple license add-on. Furthermore, as performance requirements BreakingPoint Storm CTM 4-Port 1GigE Blade to:
evolve, an additional 4- or 8-port 1GigE interface blade or 4-port • Harden network infrastructures by assaulting them with a
10GigE interface blade can be added to the same BreakingPoint custom, global, and current blend of stateful applications, live
CTM 4U chassis. security attacks, and high-stress load to probe every weakness
and vulnerability.
Advanced Capabilities and Ease of Use • Optimize data center resiliency by simulating the behavior of
BreakingPoint offers the industry’s fastest time-to-test for virtually millions of users, a crush of real-world applications, and security
any scenario. To help users leverage its extensive performance attacks—without deploying racks of servers and costly software.
and security testing capabilities, each BreakingPoint CTM features • Evaluate and select the most appropriate network equipment
an intuitive user interface and dedicated Test Labs for common for critical infrastructure with standardized and repeatable
scenarios such as: product assessments.
• Mobility Testing: Create wireless user behavior, application • Measure and harden the resiliency of routers, switches,
traffic, and security attacks over 3G and LTE/4G wireless firewalls, IPS and UTM devices, and other equipment by
network protocols. subjecting them to real-world conditions prior to deployment
• Lawful Intercept/Data Loss Prevention: Validate lawful and after patches or reconfiguration.
intercept and data loss prevention systems with multilingual • Audit and maintain standards compliance throughout the life
“needle in a haystack” simulation. cycle of network and data center devices.
• RFC 2544: Test against industry standards for packet-forwarding • Analyze the impact of traffic on network devices and systems to
rates. conduct research and train the next generation of security experts.
2. Comprehensive World-Class Security Unsurpassed Performance
Applications 4,500+ Live Security Attacks Simulates millions of users and
150 Applications 27,000 Malware Attacks blended application traf c at
Voice/Video/Media 80+ Evasion Techniques line speeds on all ports
Database Complete Microsoft Tuesday Coverage Scales to unlimited performance
Mail/Messaging levels with multiple chassis
managed via a single interface
Microsoft File Service
Social Media/Gaming
>
>>>
>>>>>>>>> >>>>>>>>> >>>>>>>>> > >
>>>>
>>>
BreakingPoint Storm CTM 4-Port 1GigE Blade Features Stay Current with Comprehensive Applications, Attacks,
BreakingPoint produces blended applications and the most current Service, and Support
security attacks at global-scale performance levels while emulating BreakingPoint also provides the BreakingPoint Application and
millions of users. Each BreakingPoint device: Threat Intelligence (ATI)™ Program, an all-in-one service backed by
• Ships with more than 150 application protocols out of the box, a team of security researchers and application protocol engineers,
including popular applications such as AOL® IM, BlackBerry® to complement the BreakingPoint Storm CTM. This program keeps
Services, Google® Gmail, FIX, IBM® DB2®, VMware® VMotion™, BreakingPoint products updated with the latest security attacks and
HTTP, Microsoft® CIFS/SMB, MAPI, BGP, RIP, Oracle®, Encrypted applications, as well as new features and performance add-ons.
BitTorrent™, MSN® Nexus, RADIUS, SIP, Skype™, Windows Live®
Messenger, World of Warcraft® Yahoo® Mail, Yahoo! Messenger, About BreakingPoint Systems
and many others. BreakingPoint cyber security products are the standard by which
• Provides 4,500+ live security attacks and 28,000+ pieces of the world’s governments, enterprises, and service providers
malware—including mobile malware—out of the box, with optimize and harden the resiliency of their cyber infrastructures.
new attacks made available weekly, and the industry’s only Learn more about BreakingPoint products and services by
full coverage for Microsoft security updates within 24 hours of
contacting a representative in your area.
announcement.
• Enables sophisticated attack simulation with more than 100
1.866.352.6691 U.S. Toll Free
evasions, botnet-driven distributed denial of service (DDoS)
www.breakingpoint.com
attacks, and more.
• Scales to unlimited performance levels with multiple chassis
managed via a single interface and configuration, with
integrated reporting.