Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
BreakingPoint Storm CTM - The Alternative to Costly and Complex Cyber Range Data Sheet
1. BreakingPoint Storm CTM™:
The Alternative to Costly and Complex Cyber Ranges
The BreakingPoint Storm CTM™: The Alternative to
Costly and Complex Cyber Ranges
Unleash Internet-scale cyber war in a controlled environment to measure the resiliency of network and data
center infrastructures, advance research and development, and train cyber warriors
Cyber ranges are critical tools for hardening the resiliency—security, attack. With its innovative, future-proof approach to delivering the
stability, and performance—of vital government, military, and capabilities of a traditional cyber range from a 3-slot chassis, a single
intelligence cyber infrastructures. Yet cyber ranges require massive BreakingPoint Storm CTM emulates a complete global network with:
amounts of disparate equipment from multiple vendors, large • A blend of stateful application and malicious traffic at 40
numbers of skilled personnel, and long development and testing Gigabits per second
cycles. In the past, only this resource-intensive approach could • An always-current mix of traffic from hundreds of real-world
generate the real-world conditions needed to harden defenses application protocols and thousands of attacks
against the full spectrum of cyber threats. • The ability to create and accelerate custom applications and
attacks
Building and maintaining a cyber range by throwing hardware • More than 30 million concurrent TCP sessions to emulate
and personnel at the problem is a costly and wasteful exercise. This millions of users
inefficiency does not make sense in an era of flattened defense • Comprehensive security coverage including attacks, fuzzing,
budgets and scarce human resources. More importantly, this malware, obfuscations, and evasions
approach simply cannot scale to address traffic volume and attacks • Built-in traffic profiles and use-case methodologies to
that are multiplying in both quantity and complexity. These realities accelerate productivity
mandate a new model for the modern cyber range—a “leap-ahead”
technological approach that unleashes Internet-scale cyber war Exclusive Capabilities
from a single comprehensive, easy-to-maintain device. Attack, measure, and harden the resiliency of network and data
center infrastructures with unprecedented performance and
The BreakingPoint Storm CTM: Complete Cyber Range realism.
Functionality and Massive Scale in a Small Footprint • Only the BreakingPoint Storm CTM can emulate your own
The BreakingPoint Cyber Tomography Machine (CTM) answers this large-scale network conditions with the performance, stateful
challenge because it embodies the power and scope of a cyber applications, and current attacks needed to fully validate the
range, but without requiring multi-million-dollar expenditures deep packet inspection (DPI) technologies prevalent in today’s
and teams of engineers to set up and maintain. The patented networks and data centers.
BreakingPoint Storm CTM is used by government and military • The product includes more than 150 application protocols,
organizations, as well as leading defense contractors, global including AOL® IM, Yahoo!® Mail and Messenger, Google® Gmail,
enterprises, and service providers, to harden networks and data Skype®, BitTorrent™, eDonkey, RADIUS, SIP, mobile network,
centers to be resilient in the face of escalating application load and social network, and gaming protocols. It also provides more
than 4,500 attacks and is backed by an Application and Threat
Intelligence research team dedicated to keeping applications
and attacks current, delivering Microsoft Tuesday coverage, and
providing frequent feature and performance enhancements.
• The integrated BreakingPoint Resiliency Score™ provides
standardized and repeatable measurements of the security,
stability, and performance of every component of networks
and data centers. Developed using standards by organizations
such as US–CERT, IEEE, and the IETF, as well as insight into traffic
from the world’s largest service providers, it provides advance
insight into how your product or environment will be impacted