SlideShare uma empresa Scribd logo
1 de 3
Baixar para ler offline
BreakingPoint Cost-Effective Testing




Cost-Effective Security and Performance Testing
BreakingPoint Storm CTM™ 4-Port 1GigE Blade Provides Unprecedented Value for Performance
and Security Testing


The BreakingPoint Storm Cyber Tomography Machine (CTM)
is designed to test the performance and security of network
and data center devices and systems in order to harden and
optimize resiliency. The BreakingPoint Storm CTM 4-Port 1GigE
Blade provides the most cost-effective way for any organization
to pinpoint previously impossible-to-detect weaknesses and
vulnerabilities in networks, network devices, and data centers before
they are exploited to wreak havoc within critical IT infrastructures.

The BreakingPoint Storm CTM 4-Port 1GigE Blade
The 4-port 1GigE blade is used in any BreakingPoint CTM 4U chassis
                                                                            •	 Session Sender: Measure connection-processing capabilities
and provides line-speed performance for blended application
                                                                               for security devices.
traffic and live security attacks on all ports. For users who need the
                                                                            •	 Multicast: Create traffic from streaming media and financial
advanced capabilities of blended application traffic, security attacks,
                                                                               services communication protocols.
and live malware but don’t require the blistering performance of
                                                                            •	 Resiliency Score: Measure device performance, security, and
the other BreakingPoint Storm CTM or BreakingPoint FireStorm
                                                                               stability on a scientific, objective basis.
CTM blades, the 4-port 1GigE blade offers the ideal combination of
performance, functionality, and value.                                      •	 Data Center Resiliency Score: Determine user capacity of
                                                                               virtualized servers using real-world applications.

Besides offering 4 ports of authentic line-speed traffic, the 4-port      Enterprises, government agencies and defense contractors, service
1GigE blade can double in port density and performance through a          providers, and network equipment manufacturers rely on the
simple license add-on. Furthermore, as performance requirements           BreakingPoint Storm CTM 4-Port 1GigE Blade to:
evolve, an additional 4- or 8-port 1GigE interface blade or 4-port          •	 Harden network infrastructures by assaulting them with a
10GigE interface blade can be added to the same BreakingPoint                  custom, global, and current blend of stateful applications, live
CTM 4U chassis.                                                                security attacks, and high-stress load to probe every weakness
                                                                               and vulnerability.
Advanced Capabilities and Ease of Use                                       •	 Optimize data center resiliency by simulating the behavior of
BreakingPoint offers the industry’s fastest time-to-test for virtually         millions of users, a crush of real-world applications, and security
any scenario. To help users leverage its extensive performance                 attacks—without deploying racks of servers and costly software.
and security testing capabilities, each BreakingPoint CTM features          •	 Evaluate and select the most appropriate network equipment
an intuitive user interface and dedicated Test Labs for common                 for critical infrastructure with standardized and repeatable
scenarios such as:                                                             product assessments.
  •	 Mobility Testing: Create wireless user behavior, application           •	 Measure and harden the resiliency of routers, switches,
     traffic, and security attacks over 3G and LTE/4G wireless                 firewalls, IPS and UTM devices, and other equipment by
     network protocols.                                                        subjecting them to real-world conditions prior to deployment
  •	 Lawful Intercept/Data Loss Prevention: Validate lawful                    and after patches or reconfiguration.
     intercept and data loss prevention systems with multilingual           •	 Audit and maintain standards compliance throughout the life
     “needle in a haystack” simulation.                                        cycle of network and data center devices.
  •	 RFC 2544: Test against industry standards for packet-forwarding        •	 Analyze the impact of traffic on network devices and systems to
     rates.                                                                    conduct research and train the next generation of security experts.
Comprehensive            World-Class Security                  Unsurpassed Performance
                                                                    Applications             4,500+ Live Security Attacks          Simulates millions of users and
                                                                    150 Applications         27,000 Malware Attacks                blended application traf c at
                                                                    Voice/Video/Media        80+ Evasion Techniques                line speeds on all ports
                                                                    Database                 Complete Microsoft Tuesday Coverage   Scales to unlimited performance
                                                                    Mail/Messaging                                                 levels with multiple chassis
                                                                                                                                   managed via a single interface
                                                                    Microsoft File Service
                                                                    Social Media/Gaming
            >
      >>>



          >>>>>>>>> >>>>>>>>> >>>>>>>>> > >




                                                                                                                                        >>>>
                                                            >>>



BreakingPoint Storm CTM 4-Port 1GigE Blade Features                           Stay Current with Comprehensive Applications, Attacks,
BreakingPoint produces blended applications and the most current              Service, and Support
security attacks at global-scale performance levels while emulating           BreakingPoint also provides the BreakingPoint Application and
millions of users. Each BreakingPoint device:                                 Threat Intelligence (ATI)™ Program, an all-in-one service backed by
  •	 Ships with more than 150 application protocols out of the box,           a team of security researchers and application protocol engineers,
     including popular applications such as AOL® IM, BlackBerry®              to complement the BreakingPoint Storm CTM. This program keeps
     Services, Google® Gmail, FIX, IBM® DB2®, VMware® VMotion™,               BreakingPoint products updated with the latest security attacks and
     HTTP, Microsoft® CIFS/SMB, MAPI, BGP, RIP, Oracle®, Encrypted            applications, as well as new features and performance add-ons.
     BitTorrent™, MSN® Nexus, RADIUS, SIP, Skype™, Windows Live®
     Messenger, World of Warcraft® Yahoo® Mail, Yahoo! Messenger,             About BreakingPoint Systems
     and many others.                                                         BreakingPoint cyber security products are the standard by which
  •	 Provides 4,500+ live security attacks and 28,000+ pieces of              the world’s governments, enterprises, and service providers
     malware—including mobile malware—out of the box, with                    optimize and harden the resiliency of their cyber infrastructures.
     new attacks made available weekly, and the industry’s only               Learn more about BreakingPoint products and services by
     full coverage for Microsoft security updates within 24 hours of
                                                                              contacting a representative in your area.
     announcement.
  •	 Enables sophisticated attack simulation with more than 100
                                                                              1.866.352.6691 U.S. Toll Free
     evasions, botnet-driven distributed denial of service (DDoS)
                                                                              www.breakingpoint.com
     attacks, and more.
  •	 Scales to unlimited performance levels with multiple chassis
     managed via a single interface and configuration, with
     integrated reporting.
BreakingPoint Cost-Effective Testing



  BreakingPoint Storm CTM with 4-Port 1GigE Blade Specifications
  Selected Performance Information                                                             System Configuration and Expansion Options
    •	 4 gigabits per second of stateful application traffic                                     •	 4U chassis with 1 system controller
     •	 7.5 million concurrent flows                                                              •	 Up to 2 interface blades per chassis:
     •	 21,000 SSL transactions per second                                                           •	 1 GigE Interface blade
                                                                                                     •	 4 ports
  BreakingPoint Storm CTM Physical Specifications                                                    •	 SFP interfaces
    •	 Rack Units: 4                                                                                 •	 1 GB of capture buffer per port
     •	 Installed: 17.4 in W x 7 in H x 19.5 in D                                                 •	 Expansion options:
        (44.2 cm W x 17.8 cm H x 49.8 cm D)                                                          •	 1GigE Interface blade (as above)
     •	 Shipping Weight: 45 lb (20.4 kg)                                                                  •	 4-port add-on kit to expand to 8 ports
     •	 Operating Environment: 15° C to 40° C                                                        •	 1GigE Interface blade
     •	 Nonoperating Environment: -20° C to 70° C                                                         •	 8 ports
     •	 Power Requirements: 100 – 240V, 50/60 Hz                                                          •	 SFP interfaces
     •	 Maximum Power Consumption: 1200W                                                                  •	 1 GB of capture buffer per port
     •	 Regulatory Approvals: FCC Class A, CE, EN60950                                               •	 10GigE Interface blade
                                                                                                          •	 4 ports
                                                                                                          •	 XFP interfaces
                                                                                                          •	 2 GB of capture buffer per port




www.breakingpoint.com
© 2005 – 2011. BreakingPoint Systems, Inc. All rights reserved. The BreakingPoint logo is a trademark of BreakingPoint Systems, Inc.
All other trademarks are the property of their respective owners.

Mais conteúdo relacionado

Mais procurados

Measure Network Performance, Security and Stability
Measure Network Performance, Security and StabilityMeasure Network Performance, Security and Stability
Measure Network Performance, Security and StabilityIxia
 
BreakingPoint Custom Application Toolkit
BreakingPoint Custom Application ToolkitBreakingPoint Custom Application Toolkit
BreakingPoint Custom Application ToolkitIxia
 
Breakingpoint Application Threat and Intelligence (ATI) Program
Breakingpoint Application Threat and Intelligence (ATI) ProgramBreakingpoint Application Threat and Intelligence (ATI) Program
Breakingpoint Application Threat and Intelligence (ATI) ProgramIxia
 
IPS Test Methodology
IPS Test MethodologyIPS Test Methodology
IPS Test MethodologyIxia
 
BreakingPoint & McAfee RSA Conference 2011 Presentation: Data Sheets Lie
BreakingPoint & McAfee RSA Conference 2011 Presentation: Data Sheets LieBreakingPoint & McAfee RSA Conference 2011 Presentation: Data Sheets Lie
BreakingPoint & McAfee RSA Conference 2011 Presentation: Data Sheets LieIxia
 
BreakingPoint & Juniper RSA Conference 2011 Presentation: Evaluating The Juni...
BreakingPoint & Juniper RSA Conference 2011 Presentation: Evaluating The Juni...BreakingPoint & Juniper RSA Conference 2011 Presentation: Evaluating The Juni...
BreakingPoint & Juniper RSA Conference 2011 Presentation: Evaluating The Juni...Ixia
 
BreakingPoint Cloud and Virtualization Data Sheet
BreakingPoint Cloud and Virtualization Data SheetBreakingPoint Cloud and Virtualization Data Sheet
BreakingPoint Cloud and Virtualization Data SheetIxia
 
The ROI for Early Testing 120816 (Ixia)
The ROI for Early Testing 120816 (Ixia)The ROI for Early Testing 120816 (Ixia)
The ROI for Early Testing 120816 (Ixia)ixiademandgen
 
F5's IP Intelligence Service
F5's IP Intelligence ServiceF5's IP Intelligence Service
F5's IP Intelligence ServiceF5 Networks
 
BreakingPoint & Fortinet RSA Conference 2011 Presentation: Evaluating Enterpr...
BreakingPoint & Fortinet RSA Conference 2011 Presentation: Evaluating Enterpr...BreakingPoint & Fortinet RSA Conference 2011 Presentation: Evaluating Enterpr...
BreakingPoint & Fortinet RSA Conference 2011 Presentation: Evaluating Enterpr...Ixia
 
Kerio Control 7 Overview
Kerio Control 7 OverviewKerio Control 7 Overview
Kerio Control 7 Overviewrkoscak
 
Datasheet Kerio Control
Datasheet Kerio ControlDatasheet Kerio Control
Datasheet Kerio Controlrkoscak
 
ASA Firepower NGFW Update and Deployment Scenarios
ASA Firepower NGFW Update and Deployment ScenariosASA Firepower NGFW Update and Deployment Scenarios
ASA Firepower NGFW Update and Deployment ScenariosCisco Canada
 
Dell sonicwall connected security
Dell sonicwall connected securityDell sonicwall connected security
Dell sonicwall connected securityMotty Ben Atia
 

Mais procurados (20)

Measure Network Performance, Security and Stability
Measure Network Performance, Security and StabilityMeasure Network Performance, Security and Stability
Measure Network Performance, Security and Stability
 
BreakingPoint Custom Application Toolkit
BreakingPoint Custom Application ToolkitBreakingPoint Custom Application Toolkit
BreakingPoint Custom Application Toolkit
 
Breakingpoint Application Threat and Intelligence (ATI) Program
Breakingpoint Application Threat and Intelligence (ATI) ProgramBreakingpoint Application Threat and Intelligence (ATI) Program
Breakingpoint Application Threat and Intelligence (ATI) Program
 
IPS Test Methodology
IPS Test MethodologyIPS Test Methodology
IPS Test Methodology
 
BreakingPoint & McAfee RSA Conference 2011 Presentation: Data Sheets Lie
BreakingPoint & McAfee RSA Conference 2011 Presentation: Data Sheets LieBreakingPoint & McAfee RSA Conference 2011 Presentation: Data Sheets Lie
BreakingPoint & McAfee RSA Conference 2011 Presentation: Data Sheets Lie
 
BreakingPoint & Juniper RSA Conference 2011 Presentation: Evaluating The Juni...
BreakingPoint & Juniper RSA Conference 2011 Presentation: Evaluating The Juni...BreakingPoint & Juniper RSA Conference 2011 Presentation: Evaluating The Juni...
BreakingPoint & Juniper RSA Conference 2011 Presentation: Evaluating The Juni...
 
BreakingPoint Cloud and Virtualization Data Sheet
BreakingPoint Cloud and Virtualization Data SheetBreakingPoint Cloud and Virtualization Data Sheet
BreakingPoint Cloud and Virtualization Data Sheet
 
The ROI for Early Testing 120816 (Ixia)
The ROI for Early Testing 120816 (Ixia)The ROI for Early Testing 120816 (Ixia)
The ROI for Early Testing 120816 (Ixia)
 
F5's IP Intelligence Service
F5's IP Intelligence ServiceF5's IP Intelligence Service
F5's IP Intelligence Service
 
BreakingPoint & Fortinet RSA Conference 2011 Presentation: Evaluating Enterpr...
BreakingPoint & Fortinet RSA Conference 2011 Presentation: Evaluating Enterpr...BreakingPoint & Fortinet RSA Conference 2011 Presentation: Evaluating Enterpr...
BreakingPoint & Fortinet RSA Conference 2011 Presentation: Evaluating Enterpr...
 
Bezpečnostní architektura F5
Bezpečnostní architektura F5Bezpečnostní architektura F5
Bezpečnostní architektura F5
 
Symantec Endpoint Suite
Symantec Endpoint SuiteSymantec Endpoint Suite
Symantec Endpoint Suite
 
Kerio Control 7 Overview
Kerio Control 7 OverviewKerio Control 7 Overview
Kerio Control 7 Overview
 
Checkpoint Overview
Checkpoint OverviewCheckpoint Overview
Checkpoint Overview
 
Datasheet Kerio Control
Datasheet Kerio ControlDatasheet Kerio Control
Datasheet Kerio Control
 
ASA Firepower NGFW Update and Deployment Scenarios
ASA Firepower NGFW Update and Deployment ScenariosASA Firepower NGFW Update and Deployment Scenarios
ASA Firepower NGFW Update and Deployment Scenarios
 
Dell sonicwall connected security
Dell sonicwall connected securityDell sonicwall connected security
Dell sonicwall connected security
 
Ngfw overview
Ngfw overviewNgfw overview
Ngfw overview
 
Sandboxing
SandboxingSandboxing
Sandboxing
 
F5 beyond load balancer (nov 2009)
F5 beyond load balancer (nov 2009)F5 beyond load balancer (nov 2009)
F5 beyond load balancer (nov 2009)
 

Semelhante a BreakingPoint 4-Port 1GigE Blade Cost-Effective Testing

LTE Testing - Network Performance, Security, and Stability at Massive Scale
LTE Testing - Network Performance, Security, and Stability at Massive ScaleLTE Testing - Network Performance, Security, and Stability at Massive Scale
LTE Testing - Network Performance, Security, and Stability at Massive ScaleIxia
 
BreakingPoint Resiliency Score Data Sheet
BreakingPoint Resiliency Score Data SheetBreakingPoint Resiliency Score Data Sheet
BreakingPoint Resiliency Score Data SheetIxia
 
Fadi El Moussa Secure Cloud 2012 V2
Fadi El Moussa Secure Cloud 2012 V2Fadi El Moussa Secure Cloud 2012 V2
Fadi El Moussa Secure Cloud 2012 V2fadielmoussa
 
BreakingPoint от Ixia
BreakingPoint от IxiaBreakingPoint от Ixia
BreakingPoint от IxiaBAKOTECH
 
Resume | Vijay Navgire
Resume | Vijay Navgire Resume | Vijay Navgire
Resume | Vijay Navgire Vijay Νavgire
 
Watchguard security proposal 2012
Watchguard security proposal 2012Watchguard security proposal 2012
Watchguard security proposal 2012Jimmy Saigon
 
Thinking about SDN and whether it is the right approach for your organization?
Thinking about SDN and whether it is the right approach for your organization?Thinking about SDN and whether it is the right approach for your organization?
Thinking about SDN and whether it is the right approach for your organization?Cisco Canada
 
f5_synthesis_cisco_connect.pdf
f5_synthesis_cisco_connect.pdff5_synthesis_cisco_connect.pdf
f5_synthesis_cisco_connect.pdfGrigoryShkolnik1
 
IBM Tivoli Endpoint Manager - PCTY 2011
IBM Tivoli Endpoint Manager - PCTY 2011IBM Tivoli Endpoint Manager - PCTY 2011
IBM Tivoli Endpoint Manager - PCTY 2011IBM Sverige
 
CyberoamBrochure
CyberoamBrochureCyberoamBrochure
CyberoamBrochureMaliha Ali
 
CyberoamBrochure
CyberoamBrochureCyberoamBrochure
CyberoamBrochurebakar kazmi
 
CyberoamBrochure
CyberoamBrochureCyberoamBrochure
CyberoamBrochureMaliha Ali
 
CyberoamBrochure
CyberoamBrochureCyberoamBrochure
CyberoamBrochureBaqar kazmi
 
Cyberoam-Brochure
Cyberoam-BrochureCyberoam-Brochure
Cyberoam-BrochureBaqar Kazmi
 
CyberoamBrochure
CyberoamBrochureCyberoamBrochure
CyberoamBrochureBaqar Kazmi
 
CyberoamBrochure
CyberoamBrochureCyberoamBrochure
CyberoamBrochureMaliha Ali
 
BT Cloud Enterprise Service Store - Rob Rowlingson
BT Cloud Enterprise Service Store - Rob RowlingsonBT Cloud Enterprise Service Store - Rob Rowlingson
BT Cloud Enterprise Service Store - Rob RowlingsonDigital Catapult
 
Comparison Review Forticlient x Kaspersky.pdf
Comparison Review Forticlient x Kaspersky.pdfComparison Review Forticlient x Kaspersky.pdf
Comparison Review Forticlient x Kaspersky.pdfImamBahrudin5
 

Semelhante a BreakingPoint 4-Port 1GigE Blade Cost-Effective Testing (20)

LTE Testing - Network Performance, Security, and Stability at Massive Scale
LTE Testing - Network Performance, Security, and Stability at Massive ScaleLTE Testing - Network Performance, Security, and Stability at Massive Scale
LTE Testing - Network Performance, Security, and Stability at Massive Scale
 
BreakingPoint Resiliency Score Data Sheet
BreakingPoint Resiliency Score Data SheetBreakingPoint Resiliency Score Data Sheet
BreakingPoint Resiliency Score Data Sheet
 
Fadi El Moussa Secure Cloud 2012 V2
Fadi El Moussa Secure Cloud 2012 V2Fadi El Moussa Secure Cloud 2012 V2
Fadi El Moussa Secure Cloud 2012 V2
 
Bizhub v care security white paper version 2
Bizhub v care security white paper version 2Bizhub v care security white paper version 2
Bizhub v care security white paper version 2
 
BreakingPoint от Ixia
BreakingPoint от IxiaBreakingPoint от Ixia
BreakingPoint от Ixia
 
Resume | Vijay Navgire
Resume | Vijay Navgire Resume | Vijay Navgire
Resume | Vijay Navgire
 
Watchguard security proposal 2012
Watchguard security proposal 2012Watchguard security proposal 2012
Watchguard security proposal 2012
 
Thinking about SDN and whether it is the right approach for your organization?
Thinking about SDN and whether it is the right approach for your organization?Thinking about SDN and whether it is the right approach for your organization?
Thinking about SDN and whether it is the right approach for your organization?
 
f5_synthesis_cisco_connect.pdf
f5_synthesis_cisco_connect.pdff5_synthesis_cisco_connect.pdf
f5_synthesis_cisco_connect.pdf
 
IBM Tivoli Endpoint Manager - PCTY 2011
IBM Tivoli Endpoint Manager - PCTY 2011IBM Tivoli Endpoint Manager - PCTY 2011
IBM Tivoli Endpoint Manager - PCTY 2011
 
CyberoamBrochure
CyberoamBrochureCyberoamBrochure
CyberoamBrochure
 
CyberoamBrochure
CyberoamBrochureCyberoamBrochure
CyberoamBrochure
 
CyberoamBrochure
CyberoamBrochureCyberoamBrochure
CyberoamBrochure
 
CyberoamBrochure
CyberoamBrochureCyberoamBrochure
CyberoamBrochure
 
Cyberoam-Brochure
Cyberoam-BrochureCyberoam-Brochure
Cyberoam-Brochure
 
CyberoamBrochure
CyberoamBrochureCyberoamBrochure
CyberoamBrochure
 
CyberoamBrochure
CyberoamBrochureCyberoamBrochure
CyberoamBrochure
 
BT Cloud Enterprise Service Store - Rob Rowlingson
BT Cloud Enterprise Service Store - Rob RowlingsonBT Cloud Enterprise Service Store - Rob Rowlingson
BT Cloud Enterprise Service Store - Rob Rowlingson
 
Cr vs fortinet
Cr vs fortinetCr vs fortinet
Cr vs fortinet
 
Comparison Review Forticlient x Kaspersky.pdf
Comparison Review Forticlient x Kaspersky.pdfComparison Review Forticlient x Kaspersky.pdf
Comparison Review Forticlient x Kaspersky.pdf
 

Mais de Ixia

LTE Testing | 4G Testing
LTE Testing | 4G TestingLTE Testing | 4G Testing
LTE Testing | 4G TestingIxia
 
White Paper: Six-Step Competitive Device Evaluation
White Paper: Six-Step Competitive Device EvaluationWhite Paper: Six-Step Competitive Device Evaluation
White Paper: Six-Step Competitive Device EvaluationIxia
 
Deep Packet Inspection (DPI) Test Methodology
Deep Packet Inspection (DPI) Test MethodologyDeep Packet Inspection (DPI) Test Methodology
Deep Packet Inspection (DPI) Test MethodologyIxia
 
Load Test Methodology: Server Load Testing
Load Test Methodology: Server Load TestingLoad Test Methodology: Server Load Testing
Load Test Methodology: Server Load TestingIxia
 
IPv6 Test Methodology
IPv6 Test MethodologyIPv6 Test Methodology
IPv6 Test MethodologyIxia
 
Server Load Balancer Test Methodology
Server Load Balancer Test MethodologyServer Load Balancer Test Methodology
Server Load Balancer Test MethodologyIxia
 
Catalyst 6500 ASA Service Module
Catalyst 6500 ASA Service ModuleCatalyst 6500 ASA Service Module
Catalyst 6500 ASA Service ModuleIxia
 
Testing High Performance Firewalls
Testing High Performance FirewallsTesting High Performance Firewalls
Testing High Performance FirewallsIxia
 
BreakingPoint & Stonesoft RSA Conference 2011 Presentation: Evaluating IPS
BreakingPoint & Stonesoft RSA Conference 2011 Presentation: Evaluating IPSBreakingPoint & Stonesoft RSA Conference 2011 Presentation: Evaluating IPS
BreakingPoint & Stonesoft RSA Conference 2011 Presentation: Evaluating IPSIxia
 
Cybersecurity: Arm and Train US Warriors to Win Cyber War
Cybersecurity: Arm and Train US Warriors to Win Cyber WarCybersecurity: Arm and Train US Warriors to Win Cyber War
Cybersecurity: Arm and Train US Warriors to Win Cyber WarIxia
 
Harden Security Devices Against Increasingly Sophisticated Evasions
Harden Security Devices Against Increasingly Sophisticated EvasionsHarden Security Devices Against Increasingly Sophisticated Evasions
Harden Security Devices Against Increasingly Sophisticated EvasionsIxia
 

Mais de Ixia (11)

LTE Testing | 4G Testing
LTE Testing | 4G TestingLTE Testing | 4G Testing
LTE Testing | 4G Testing
 
White Paper: Six-Step Competitive Device Evaluation
White Paper: Six-Step Competitive Device EvaluationWhite Paper: Six-Step Competitive Device Evaluation
White Paper: Six-Step Competitive Device Evaluation
 
Deep Packet Inspection (DPI) Test Methodology
Deep Packet Inspection (DPI) Test MethodologyDeep Packet Inspection (DPI) Test Methodology
Deep Packet Inspection (DPI) Test Methodology
 
Load Test Methodology: Server Load Testing
Load Test Methodology: Server Load TestingLoad Test Methodology: Server Load Testing
Load Test Methodology: Server Load Testing
 
IPv6 Test Methodology
IPv6 Test MethodologyIPv6 Test Methodology
IPv6 Test Methodology
 
Server Load Balancer Test Methodology
Server Load Balancer Test MethodologyServer Load Balancer Test Methodology
Server Load Balancer Test Methodology
 
Catalyst 6500 ASA Service Module
Catalyst 6500 ASA Service ModuleCatalyst 6500 ASA Service Module
Catalyst 6500 ASA Service Module
 
Testing High Performance Firewalls
Testing High Performance FirewallsTesting High Performance Firewalls
Testing High Performance Firewalls
 
BreakingPoint & Stonesoft RSA Conference 2011 Presentation: Evaluating IPS
BreakingPoint & Stonesoft RSA Conference 2011 Presentation: Evaluating IPSBreakingPoint & Stonesoft RSA Conference 2011 Presentation: Evaluating IPS
BreakingPoint & Stonesoft RSA Conference 2011 Presentation: Evaluating IPS
 
Cybersecurity: Arm and Train US Warriors to Win Cyber War
Cybersecurity: Arm and Train US Warriors to Win Cyber WarCybersecurity: Arm and Train US Warriors to Win Cyber War
Cybersecurity: Arm and Train US Warriors to Win Cyber War
 
Harden Security Devices Against Increasingly Sophisticated Evasions
Harden Security Devices Against Increasingly Sophisticated EvasionsHarden Security Devices Against Increasingly Sophisticated Evasions
Harden Security Devices Against Increasingly Sophisticated Evasions
 

Último

Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsRoshan Dwivedi
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 

Último (20)

Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 

BreakingPoint 4-Port 1GigE Blade Cost-Effective Testing

  • 1. BreakingPoint Cost-Effective Testing Cost-Effective Security and Performance Testing BreakingPoint Storm CTM™ 4-Port 1GigE Blade Provides Unprecedented Value for Performance and Security Testing The BreakingPoint Storm Cyber Tomography Machine (CTM) is designed to test the performance and security of network and data center devices and systems in order to harden and optimize resiliency. The BreakingPoint Storm CTM 4-Port 1GigE Blade provides the most cost-effective way for any organization to pinpoint previously impossible-to-detect weaknesses and vulnerabilities in networks, network devices, and data centers before they are exploited to wreak havoc within critical IT infrastructures. The BreakingPoint Storm CTM 4-Port 1GigE Blade The 4-port 1GigE blade is used in any BreakingPoint CTM 4U chassis • Session Sender: Measure connection-processing capabilities and provides line-speed performance for blended application for security devices. traffic and live security attacks on all ports. For users who need the • Multicast: Create traffic from streaming media and financial advanced capabilities of blended application traffic, security attacks, services communication protocols. and live malware but don’t require the blistering performance of • Resiliency Score: Measure device performance, security, and the other BreakingPoint Storm CTM or BreakingPoint FireStorm stability on a scientific, objective basis. CTM blades, the 4-port 1GigE blade offers the ideal combination of performance, functionality, and value. • Data Center Resiliency Score: Determine user capacity of virtualized servers using real-world applications. Besides offering 4 ports of authentic line-speed traffic, the 4-port Enterprises, government agencies and defense contractors, service 1GigE blade can double in port density and performance through a providers, and network equipment manufacturers rely on the simple license add-on. Furthermore, as performance requirements BreakingPoint Storm CTM 4-Port 1GigE Blade to: evolve, an additional 4- or 8-port 1GigE interface blade or 4-port • Harden network infrastructures by assaulting them with a 10GigE interface blade can be added to the same BreakingPoint custom, global, and current blend of stateful applications, live CTM 4U chassis. security attacks, and high-stress load to probe every weakness and vulnerability. Advanced Capabilities and Ease of Use • Optimize data center resiliency by simulating the behavior of BreakingPoint offers the industry’s fastest time-to-test for virtually millions of users, a crush of real-world applications, and security any scenario. To help users leverage its extensive performance attacks—without deploying racks of servers and costly software. and security testing capabilities, each BreakingPoint CTM features • Evaluate and select the most appropriate network equipment an intuitive user interface and dedicated Test Labs for common for critical infrastructure with standardized and repeatable scenarios such as: product assessments. • Mobility Testing: Create wireless user behavior, application • Measure and harden the resiliency of routers, switches, traffic, and security attacks over 3G and LTE/4G wireless firewalls, IPS and UTM devices, and other equipment by network protocols. subjecting them to real-world conditions prior to deployment • Lawful Intercept/Data Loss Prevention: Validate lawful and after patches or reconfiguration. intercept and data loss prevention systems with multilingual • Audit and maintain standards compliance throughout the life “needle in a haystack” simulation. cycle of network and data center devices. • RFC 2544: Test against industry standards for packet-forwarding • Analyze the impact of traffic on network devices and systems to rates. conduct research and train the next generation of security experts.
  • 2. Comprehensive World-Class Security Unsurpassed Performance Applications 4,500+ Live Security Attacks Simulates millions of users and 150 Applications 27,000 Malware Attacks blended application traf c at Voice/Video/Media 80+ Evasion Techniques line speeds on all ports Database Complete Microsoft Tuesday Coverage Scales to unlimited performance Mail/Messaging levels with multiple chassis managed via a single interface Microsoft File Service Social Media/Gaming > >>> >>>>>>>>> >>>>>>>>> >>>>>>>>> > > >>>> >>> BreakingPoint Storm CTM 4-Port 1GigE Blade Features Stay Current with Comprehensive Applications, Attacks, BreakingPoint produces blended applications and the most current Service, and Support security attacks at global-scale performance levels while emulating BreakingPoint also provides the BreakingPoint Application and millions of users. Each BreakingPoint device: Threat Intelligence (ATI)™ Program, an all-in-one service backed by • Ships with more than 150 application protocols out of the box, a team of security researchers and application protocol engineers, including popular applications such as AOL® IM, BlackBerry® to complement the BreakingPoint Storm CTM. This program keeps Services, Google® Gmail, FIX, IBM® DB2®, VMware® VMotion™, BreakingPoint products updated with the latest security attacks and HTTP, Microsoft® CIFS/SMB, MAPI, BGP, RIP, Oracle®, Encrypted applications, as well as new features and performance add-ons. BitTorrent™, MSN® Nexus, RADIUS, SIP, Skype™, Windows Live® Messenger, World of Warcraft® Yahoo® Mail, Yahoo! Messenger, About BreakingPoint Systems and many others. BreakingPoint cyber security products are the standard by which • Provides 4,500+ live security attacks and 28,000+ pieces of the world’s governments, enterprises, and service providers malware—including mobile malware—out of the box, with optimize and harden the resiliency of their cyber infrastructures. new attacks made available weekly, and the industry’s only Learn more about BreakingPoint products and services by full coverage for Microsoft security updates within 24 hours of contacting a representative in your area. announcement. • Enables sophisticated attack simulation with more than 100 1.866.352.6691 U.S. Toll Free evasions, botnet-driven distributed denial of service (DDoS) www.breakingpoint.com attacks, and more. • Scales to unlimited performance levels with multiple chassis managed via a single interface and configuration, with integrated reporting.
  • 3. BreakingPoint Cost-Effective Testing BreakingPoint Storm CTM with 4-Port 1GigE Blade Specifications Selected Performance Information System Configuration and Expansion Options • 4 gigabits per second of stateful application traffic • 4U chassis with 1 system controller • 7.5 million concurrent flows • Up to 2 interface blades per chassis: • 21,000 SSL transactions per second • 1 GigE Interface blade • 4 ports BreakingPoint Storm CTM Physical Specifications • SFP interfaces • Rack Units: 4 • 1 GB of capture buffer per port • Installed: 17.4 in W x 7 in H x 19.5 in D • Expansion options: (44.2 cm W x 17.8 cm H x 49.8 cm D) • 1GigE Interface blade (as above) • Shipping Weight: 45 lb (20.4 kg) • 4-port add-on kit to expand to 8 ports • Operating Environment: 15° C to 40° C • 1GigE Interface blade • Nonoperating Environment: -20° C to 70° C • 8 ports • Power Requirements: 100 – 240V, 50/60 Hz • SFP interfaces • Maximum Power Consumption: 1200W • 1 GB of capture buffer per port • Regulatory Approvals: FCC Class A, CE, EN60950 • 10GigE Interface blade • 4 ports • XFP interfaces • 2 GB of capture buffer per port www.breakingpoint.com © 2005 – 2011. BreakingPoint Systems, Inc. All rights reserved. The BreakingPoint logo is a trademark of BreakingPoint Systems, Inc. All other trademarks are the property of their respective owners.