SlideShare una empresa de Scribd logo
1 de 3
Descargar para leer sin conexión
BreakingPoint Cost-Effective Testing




Cost-Effective Security and Performance Testing
BreakingPoint Storm CTM™ 4-Port 1GigE Blade Provides Unprecedented Value for Performance
and Security Testing


The BreakingPoint Storm Cyber Tomography Machine (CTM)
is designed to test the performance and security of network
and data center devices and systems in order to harden and
optimize resiliency. The BreakingPoint Storm CTM 4-Port 1GigE
Blade provides the most cost-effective way for any organization
to pinpoint previously impossible-to-detect weaknesses and
vulnerabilities in networks, network devices, and data centers before
they are exploited to wreak havoc within critical IT infrastructures.

The BreakingPoint Storm CTM 4-Port 1GigE Blade
The 4-port 1GigE blade is used in any BreakingPoint CTM 4U chassis
                                                                            •	 Session Sender: Measure connection-processing capabilities
and provides line-speed performance for blended application
                                                                               for security devices.
traffic and live security attacks on all ports. For users who need the
                                                                            •	 Multicast: Create traffic from streaming media and financial
advanced capabilities of blended application traffic, security attacks,
                                                                               services communication protocols.
and live malware but don’t require the blistering performance of
                                                                            •	 Resiliency Score: Measure device performance, security, and
the other BreakingPoint Storm CTM or BreakingPoint FireStorm
                                                                               stability on a scientific, objective basis.
CTM blades, the 4-port 1GigE blade offers the ideal combination of
performance, functionality, and value.                                      •	 Data Center Resiliency Score: Determine user capacity of
                                                                               virtualized servers using real-world applications.

Besides offering 4 ports of authentic line-speed traffic, the 4-port      Enterprises, government agencies and defense contractors, service
1GigE blade can double in port density and performance through a          providers, and network equipment manufacturers rely on the
simple license add-on. Furthermore, as performance requirements           BreakingPoint Storm CTM 4-Port 1GigE Blade to:
evolve, an additional 4- or 8-port 1GigE interface blade or 4-port          •	 Harden network infrastructures by assaulting them with a
10GigE interface blade can be added to the same BreakingPoint                  custom, global, and current blend of stateful applications, live
CTM 4U chassis.                                                                security attacks, and high-stress load to probe every weakness
                                                                               and vulnerability.
Advanced Capabilities and Ease of Use                                       •	 Optimize data center resiliency by simulating the behavior of
BreakingPoint offers the industry’s fastest time-to-test for virtually         millions of users, a crush of real-world applications, and security
any scenario. To help users leverage its extensive performance                 attacks—without deploying racks of servers and costly software.
and security testing capabilities, each BreakingPoint CTM features          •	 Evaluate and select the most appropriate network equipment
an intuitive user interface and dedicated Test Labs for common                 for critical infrastructure with standardized and repeatable
scenarios such as:                                                             product assessments.
  •	 Mobility Testing: Create wireless user behavior, application           •	 Measure and harden the resiliency of routers, switches,
     traffic, and security attacks over 3G and LTE/4G wireless                 firewalls, IPS and UTM devices, and other equipment by
     network protocols.                                                        subjecting them to real-world conditions prior to deployment
  •	 Lawful Intercept/Data Loss Prevention: Validate lawful                    and after patches or reconfiguration.
     intercept and data loss prevention systems with multilingual           •	 Audit and maintain standards compliance throughout the life
     “needle in a haystack” simulation.                                        cycle of network and data center devices.
  •	 RFC 2544: Test against industry standards for packet-forwarding        •	 Analyze the impact of traffic on network devices and systems to
     rates.                                                                    conduct research and train the next generation of security experts.
Comprehensive            World-Class Security                  Unsurpassed Performance
                                                                    Applications             4,500+ Live Security Attacks          Simulates millions of users and
                                                                    150 Applications         27,000 Malware Attacks                blended application traf c at
                                                                    Voice/Video/Media        80+ Evasion Techniques                line speeds on all ports
                                                                    Database                 Complete Microsoft Tuesday Coverage   Scales to unlimited performance
                                                                    Mail/Messaging                                                 levels with multiple chassis
                                                                                                                                   managed via a single interface
                                                                    Microsoft File Service
                                                                    Social Media/Gaming
            >
      >>>



          >>>>>>>>> >>>>>>>>> >>>>>>>>> > >




                                                                                                                                        >>>>
                                                            >>>



BreakingPoint Storm CTM 4-Port 1GigE Blade Features                           Stay Current with Comprehensive Applications, Attacks,
BreakingPoint produces blended applications and the most current              Service, and Support
security attacks at global-scale performance levels while emulating           BreakingPoint also provides the BreakingPoint Application and
millions of users. Each BreakingPoint device:                                 Threat Intelligence (ATI)™ Program, an all-in-one service backed by
  •	 Ships with more than 150 application protocols out of the box,           a team of security researchers and application protocol engineers,
     including popular applications such as AOL® IM, BlackBerry®              to complement the BreakingPoint Storm CTM. This program keeps
     Services, Google® Gmail, FIX, IBM® DB2®, VMware® VMotion™,               BreakingPoint products updated with the latest security attacks and
     HTTP, Microsoft® CIFS/SMB, MAPI, BGP, RIP, Oracle®, Encrypted            applications, as well as new features and performance add-ons.
     BitTorrent™, MSN® Nexus, RADIUS, SIP, Skype™, Windows Live®
     Messenger, World of Warcraft® Yahoo® Mail, Yahoo! Messenger,             About BreakingPoint Systems
     and many others.                                                         BreakingPoint cyber security products are the standard by which
  •	 Provides 4,500+ live security attacks and 28,000+ pieces of              the world’s governments, enterprises, and service providers
     malware—including mobile malware—out of the box, with                    optimize and harden the resiliency of their cyber infrastructures.
     new attacks made available weekly, and the industry’s only               Learn more about BreakingPoint products and services by
     full coverage for Microsoft security updates within 24 hours of
                                                                              contacting a representative in your area.
     announcement.
  •	 Enables sophisticated attack simulation with more than 100
                                                                              1.866.352.6691 U.S. Toll Free
     evasions, botnet-driven distributed denial of service (DDoS)
                                                                              www.breakingpoint.com
     attacks, and more.
  •	 Scales to unlimited performance levels with multiple chassis
     managed via a single interface and configuration, with
     integrated reporting.
BreakingPoint Cost-Effective Testing



  BreakingPoint Storm CTM with 4-Port 1GigE Blade Specifications
  Selected Performance Information                                                             System Configuration and Expansion Options
    •	 4 gigabits per second of stateful application traffic                                     •	 4U chassis with 1 system controller
     •	 7.5 million concurrent flows                                                              •	 Up to 2 interface blades per chassis:
     •	 21,000 SSL transactions per second                                                           •	 1 GigE Interface blade
                                                                                                     •	 4 ports
  BreakingPoint Storm CTM Physical Specifications                                                    •	 SFP interfaces
    •	 Rack Units: 4                                                                                 •	 1 GB of capture buffer per port
     •	 Installed: 17.4 in W x 7 in H x 19.5 in D                                                 •	 Expansion options:
        (44.2 cm W x 17.8 cm H x 49.8 cm D)                                                          •	 1GigE Interface blade (as above)
     •	 Shipping Weight: 45 lb (20.4 kg)                                                                  •	 4-port add-on kit to expand to 8 ports
     •	 Operating Environment: 15° C to 40° C                                                        •	 1GigE Interface blade
     •	 Nonoperating Environment: -20° C to 70° C                                                         •	 8 ports
     •	 Power Requirements: 100 – 240V, 50/60 Hz                                                          •	 SFP interfaces
     •	 Maximum Power Consumption: 1200W                                                                  •	 1 GB of capture buffer per port
     •	 Regulatory Approvals: FCC Class A, CE, EN60950                                               •	 10GigE Interface blade
                                                                                                          •	 4 ports
                                                                                                          •	 XFP interfaces
                                                                                                          •	 2 GB of capture buffer per port




www.breakingpoint.com
© 2005 – 2011. BreakingPoint Systems, Inc. All rights reserved. The BreakingPoint logo is a trademark of BreakingPoint Systems, Inc.
All other trademarks are the property of their respective owners.

Más contenido relacionado

La actualidad más candente

Measure Network Performance, Security and Stability
Measure Network Performance, Security and StabilityMeasure Network Performance, Security and Stability
Measure Network Performance, Security and StabilityIxia
 
BreakingPoint Custom Application Toolkit
BreakingPoint Custom Application ToolkitBreakingPoint Custom Application Toolkit
BreakingPoint Custom Application ToolkitIxia
 
Breakingpoint Application Threat and Intelligence (ATI) Program
Breakingpoint Application Threat and Intelligence (ATI) ProgramBreakingpoint Application Threat and Intelligence (ATI) Program
Breakingpoint Application Threat and Intelligence (ATI) ProgramIxia
 
IPS Test Methodology
IPS Test MethodologyIPS Test Methodology
IPS Test MethodologyIxia
 
BreakingPoint & McAfee RSA Conference 2011 Presentation: Data Sheets Lie
BreakingPoint & McAfee RSA Conference 2011 Presentation: Data Sheets LieBreakingPoint & McAfee RSA Conference 2011 Presentation: Data Sheets Lie
BreakingPoint & McAfee RSA Conference 2011 Presentation: Data Sheets LieIxia
 
BreakingPoint & Juniper RSA Conference 2011 Presentation: Evaluating The Juni...
BreakingPoint & Juniper RSA Conference 2011 Presentation: Evaluating The Juni...BreakingPoint & Juniper RSA Conference 2011 Presentation: Evaluating The Juni...
BreakingPoint & Juniper RSA Conference 2011 Presentation: Evaluating The Juni...Ixia
 
BreakingPoint Cloud and Virtualization Data Sheet
BreakingPoint Cloud and Virtualization Data SheetBreakingPoint Cloud and Virtualization Data Sheet
BreakingPoint Cloud and Virtualization Data SheetIxia
 
The ROI for Early Testing 120816 (Ixia)
The ROI for Early Testing 120816 (Ixia)The ROI for Early Testing 120816 (Ixia)
The ROI for Early Testing 120816 (Ixia)ixiademandgen
 
F5's IP Intelligence Service
F5's IP Intelligence ServiceF5's IP Intelligence Service
F5's IP Intelligence ServiceF5 Networks
 
BreakingPoint & Fortinet RSA Conference 2011 Presentation: Evaluating Enterpr...
BreakingPoint & Fortinet RSA Conference 2011 Presentation: Evaluating Enterpr...BreakingPoint & Fortinet RSA Conference 2011 Presentation: Evaluating Enterpr...
BreakingPoint & Fortinet RSA Conference 2011 Presentation: Evaluating Enterpr...Ixia
 
Kerio Control 7 Overview
Kerio Control 7 OverviewKerio Control 7 Overview
Kerio Control 7 Overviewrkoscak
 
Datasheet Kerio Control
Datasheet Kerio ControlDatasheet Kerio Control
Datasheet Kerio Controlrkoscak
 
ASA Firepower NGFW Update and Deployment Scenarios
ASA Firepower NGFW Update and Deployment ScenariosASA Firepower NGFW Update and Deployment Scenarios
ASA Firepower NGFW Update and Deployment ScenariosCisco Canada
 
Dell sonicwall connected security
Dell sonicwall connected securityDell sonicwall connected security
Dell sonicwall connected securityMotty Ben Atia
 

La actualidad más candente (20)

Measure Network Performance, Security and Stability
Measure Network Performance, Security and StabilityMeasure Network Performance, Security and Stability
Measure Network Performance, Security and Stability
 
BreakingPoint Custom Application Toolkit
BreakingPoint Custom Application ToolkitBreakingPoint Custom Application Toolkit
BreakingPoint Custom Application Toolkit
 
Breakingpoint Application Threat and Intelligence (ATI) Program
Breakingpoint Application Threat and Intelligence (ATI) ProgramBreakingpoint Application Threat and Intelligence (ATI) Program
Breakingpoint Application Threat and Intelligence (ATI) Program
 
IPS Test Methodology
IPS Test MethodologyIPS Test Methodology
IPS Test Methodology
 
BreakingPoint & McAfee RSA Conference 2011 Presentation: Data Sheets Lie
BreakingPoint & McAfee RSA Conference 2011 Presentation: Data Sheets LieBreakingPoint & McAfee RSA Conference 2011 Presentation: Data Sheets Lie
BreakingPoint & McAfee RSA Conference 2011 Presentation: Data Sheets Lie
 
BreakingPoint & Juniper RSA Conference 2011 Presentation: Evaluating The Juni...
BreakingPoint & Juniper RSA Conference 2011 Presentation: Evaluating The Juni...BreakingPoint & Juniper RSA Conference 2011 Presentation: Evaluating The Juni...
BreakingPoint & Juniper RSA Conference 2011 Presentation: Evaluating The Juni...
 
BreakingPoint Cloud and Virtualization Data Sheet
BreakingPoint Cloud and Virtualization Data SheetBreakingPoint Cloud and Virtualization Data Sheet
BreakingPoint Cloud and Virtualization Data Sheet
 
The ROI for Early Testing 120816 (Ixia)
The ROI for Early Testing 120816 (Ixia)The ROI for Early Testing 120816 (Ixia)
The ROI for Early Testing 120816 (Ixia)
 
F5's IP Intelligence Service
F5's IP Intelligence ServiceF5's IP Intelligence Service
F5's IP Intelligence Service
 
BreakingPoint & Fortinet RSA Conference 2011 Presentation: Evaluating Enterpr...
BreakingPoint & Fortinet RSA Conference 2011 Presentation: Evaluating Enterpr...BreakingPoint & Fortinet RSA Conference 2011 Presentation: Evaluating Enterpr...
BreakingPoint & Fortinet RSA Conference 2011 Presentation: Evaluating Enterpr...
 
Bezpečnostní architektura F5
Bezpečnostní architektura F5Bezpečnostní architektura F5
Bezpečnostní architektura F5
 
Symantec Endpoint Suite
Symantec Endpoint SuiteSymantec Endpoint Suite
Symantec Endpoint Suite
 
Kerio Control 7 Overview
Kerio Control 7 OverviewKerio Control 7 Overview
Kerio Control 7 Overview
 
Checkpoint Overview
Checkpoint OverviewCheckpoint Overview
Checkpoint Overview
 
Datasheet Kerio Control
Datasheet Kerio ControlDatasheet Kerio Control
Datasheet Kerio Control
 
ASA Firepower NGFW Update and Deployment Scenarios
ASA Firepower NGFW Update and Deployment ScenariosASA Firepower NGFW Update and Deployment Scenarios
ASA Firepower NGFW Update and Deployment Scenarios
 
Dell sonicwall connected security
Dell sonicwall connected securityDell sonicwall connected security
Dell sonicwall connected security
 
Ngfw overview
Ngfw overviewNgfw overview
Ngfw overview
 
Sandboxing
SandboxingSandboxing
Sandboxing
 
F5 beyond load balancer (nov 2009)
F5 beyond load balancer (nov 2009)F5 beyond load balancer (nov 2009)
F5 beyond load balancer (nov 2009)
 

Similar a BreakingPoint 4-Port 1GigE Blade Cost-Effective Testing

LTE Testing - Network Performance, Security, and Stability at Massive Scale
LTE Testing - Network Performance, Security, and Stability at Massive ScaleLTE Testing - Network Performance, Security, and Stability at Massive Scale
LTE Testing - Network Performance, Security, and Stability at Massive ScaleIxia
 
BreakingPoint Resiliency Score Data Sheet
BreakingPoint Resiliency Score Data SheetBreakingPoint Resiliency Score Data Sheet
BreakingPoint Resiliency Score Data SheetIxia
 
Fadi El Moussa Secure Cloud 2012 V2
Fadi El Moussa Secure Cloud 2012 V2Fadi El Moussa Secure Cloud 2012 V2
Fadi El Moussa Secure Cloud 2012 V2fadielmoussa
 
BreakingPoint от Ixia
BreakingPoint от IxiaBreakingPoint от Ixia
BreakingPoint от IxiaBAKOTECH
 
Resume | Vijay Navgire
Resume | Vijay Navgire Resume | Vijay Navgire
Resume | Vijay Navgire Vijay Νavgire
 
Watchguard security proposal 2012
Watchguard security proposal 2012Watchguard security proposal 2012
Watchguard security proposal 2012Jimmy Saigon
 
Thinking about SDN and whether it is the right approach for your organization?
Thinking about SDN and whether it is the right approach for your organization?Thinking about SDN and whether it is the right approach for your organization?
Thinking about SDN and whether it is the right approach for your organization?Cisco Canada
 
f5_synthesis_cisco_connect.pdf
f5_synthesis_cisco_connect.pdff5_synthesis_cisco_connect.pdf
f5_synthesis_cisco_connect.pdfGrigoryShkolnik1
 
IBM Tivoli Endpoint Manager - PCTY 2011
IBM Tivoli Endpoint Manager - PCTY 2011IBM Tivoli Endpoint Manager - PCTY 2011
IBM Tivoli Endpoint Manager - PCTY 2011IBM Sverige
 
CyberoamBrochure
CyberoamBrochureCyberoamBrochure
CyberoamBrochureMaliha Ali
 
CyberoamBrochure
CyberoamBrochureCyberoamBrochure
CyberoamBrochurebakar kazmi
 
CyberoamBrochure
CyberoamBrochureCyberoamBrochure
CyberoamBrochureMaliha Ali
 
CyberoamBrochure
CyberoamBrochureCyberoamBrochure
CyberoamBrochureBaqar kazmi
 
Cyberoam-Brochure
Cyberoam-BrochureCyberoam-Brochure
Cyberoam-BrochureBaqar Kazmi
 
CyberoamBrochure
CyberoamBrochureCyberoamBrochure
CyberoamBrochureBaqar Kazmi
 
CyberoamBrochure
CyberoamBrochureCyberoamBrochure
CyberoamBrochureMaliha Ali
 
BT Cloud Enterprise Service Store - Rob Rowlingson
BT Cloud Enterprise Service Store - Rob RowlingsonBT Cloud Enterprise Service Store - Rob Rowlingson
BT Cloud Enterprise Service Store - Rob RowlingsonDigital Catapult
 
Comparison Review Forticlient x Kaspersky.pdf
Comparison Review Forticlient x Kaspersky.pdfComparison Review Forticlient x Kaspersky.pdf
Comparison Review Forticlient x Kaspersky.pdfImamBahrudin5
 

Similar a BreakingPoint 4-Port 1GigE Blade Cost-Effective Testing (20)

LTE Testing - Network Performance, Security, and Stability at Massive Scale
LTE Testing - Network Performance, Security, and Stability at Massive ScaleLTE Testing - Network Performance, Security, and Stability at Massive Scale
LTE Testing - Network Performance, Security, and Stability at Massive Scale
 
BreakingPoint Resiliency Score Data Sheet
BreakingPoint Resiliency Score Data SheetBreakingPoint Resiliency Score Data Sheet
BreakingPoint Resiliency Score Data Sheet
 
Fadi El Moussa Secure Cloud 2012 V2
Fadi El Moussa Secure Cloud 2012 V2Fadi El Moussa Secure Cloud 2012 V2
Fadi El Moussa Secure Cloud 2012 V2
 
Bizhub v care security white paper version 2
Bizhub v care security white paper version 2Bizhub v care security white paper version 2
Bizhub v care security white paper version 2
 
BreakingPoint от Ixia
BreakingPoint от IxiaBreakingPoint от Ixia
BreakingPoint от Ixia
 
Resume | Vijay Navgire
Resume | Vijay Navgire Resume | Vijay Navgire
Resume | Vijay Navgire
 
Watchguard security proposal 2012
Watchguard security proposal 2012Watchguard security proposal 2012
Watchguard security proposal 2012
 
Thinking about SDN and whether it is the right approach for your organization?
Thinking about SDN and whether it is the right approach for your organization?Thinking about SDN and whether it is the right approach for your organization?
Thinking about SDN and whether it is the right approach for your organization?
 
f5_synthesis_cisco_connect.pdf
f5_synthesis_cisco_connect.pdff5_synthesis_cisco_connect.pdf
f5_synthesis_cisco_connect.pdf
 
IBM Tivoli Endpoint Manager - PCTY 2011
IBM Tivoli Endpoint Manager - PCTY 2011IBM Tivoli Endpoint Manager - PCTY 2011
IBM Tivoli Endpoint Manager - PCTY 2011
 
CyberoamBrochure
CyberoamBrochureCyberoamBrochure
CyberoamBrochure
 
CyberoamBrochure
CyberoamBrochureCyberoamBrochure
CyberoamBrochure
 
CyberoamBrochure
CyberoamBrochureCyberoamBrochure
CyberoamBrochure
 
CyberoamBrochure
CyberoamBrochureCyberoamBrochure
CyberoamBrochure
 
Cyberoam-Brochure
Cyberoam-BrochureCyberoam-Brochure
Cyberoam-Brochure
 
CyberoamBrochure
CyberoamBrochureCyberoamBrochure
CyberoamBrochure
 
CyberoamBrochure
CyberoamBrochureCyberoamBrochure
CyberoamBrochure
 
BT Cloud Enterprise Service Store - Rob Rowlingson
BT Cloud Enterprise Service Store - Rob RowlingsonBT Cloud Enterprise Service Store - Rob Rowlingson
BT Cloud Enterprise Service Store - Rob Rowlingson
 
Cr vs fortinet
Cr vs fortinetCr vs fortinet
Cr vs fortinet
 
Comparison Review Forticlient x Kaspersky.pdf
Comparison Review Forticlient x Kaspersky.pdfComparison Review Forticlient x Kaspersky.pdf
Comparison Review Forticlient x Kaspersky.pdf
 

Más de Ixia

LTE Testing | 4G Testing
LTE Testing | 4G TestingLTE Testing | 4G Testing
LTE Testing | 4G TestingIxia
 
White Paper: Six-Step Competitive Device Evaluation
White Paper: Six-Step Competitive Device EvaluationWhite Paper: Six-Step Competitive Device Evaluation
White Paper: Six-Step Competitive Device EvaluationIxia
 
Deep Packet Inspection (DPI) Test Methodology
Deep Packet Inspection (DPI) Test MethodologyDeep Packet Inspection (DPI) Test Methodology
Deep Packet Inspection (DPI) Test MethodologyIxia
 
Load Test Methodology: Server Load Testing
Load Test Methodology: Server Load TestingLoad Test Methodology: Server Load Testing
Load Test Methodology: Server Load TestingIxia
 
IPv6 Test Methodology
IPv6 Test MethodologyIPv6 Test Methodology
IPv6 Test MethodologyIxia
 
Server Load Balancer Test Methodology
Server Load Balancer Test MethodologyServer Load Balancer Test Methodology
Server Load Balancer Test MethodologyIxia
 
Catalyst 6500 ASA Service Module
Catalyst 6500 ASA Service ModuleCatalyst 6500 ASA Service Module
Catalyst 6500 ASA Service ModuleIxia
 
Testing High Performance Firewalls
Testing High Performance FirewallsTesting High Performance Firewalls
Testing High Performance FirewallsIxia
 
BreakingPoint & Stonesoft RSA Conference 2011 Presentation: Evaluating IPS
BreakingPoint & Stonesoft RSA Conference 2011 Presentation: Evaluating IPSBreakingPoint & Stonesoft RSA Conference 2011 Presentation: Evaluating IPS
BreakingPoint & Stonesoft RSA Conference 2011 Presentation: Evaluating IPSIxia
 
Cybersecurity: Arm and Train US Warriors to Win Cyber War
Cybersecurity: Arm and Train US Warriors to Win Cyber WarCybersecurity: Arm and Train US Warriors to Win Cyber War
Cybersecurity: Arm and Train US Warriors to Win Cyber WarIxia
 
Harden Security Devices Against Increasingly Sophisticated Evasions
Harden Security Devices Against Increasingly Sophisticated EvasionsHarden Security Devices Against Increasingly Sophisticated Evasions
Harden Security Devices Against Increasingly Sophisticated EvasionsIxia
 

Más de Ixia (11)

LTE Testing | 4G Testing
LTE Testing | 4G TestingLTE Testing | 4G Testing
LTE Testing | 4G Testing
 
White Paper: Six-Step Competitive Device Evaluation
White Paper: Six-Step Competitive Device EvaluationWhite Paper: Six-Step Competitive Device Evaluation
White Paper: Six-Step Competitive Device Evaluation
 
Deep Packet Inspection (DPI) Test Methodology
Deep Packet Inspection (DPI) Test MethodologyDeep Packet Inspection (DPI) Test Methodology
Deep Packet Inspection (DPI) Test Methodology
 
Load Test Methodology: Server Load Testing
Load Test Methodology: Server Load TestingLoad Test Methodology: Server Load Testing
Load Test Methodology: Server Load Testing
 
IPv6 Test Methodology
IPv6 Test MethodologyIPv6 Test Methodology
IPv6 Test Methodology
 
Server Load Balancer Test Methodology
Server Load Balancer Test MethodologyServer Load Balancer Test Methodology
Server Load Balancer Test Methodology
 
Catalyst 6500 ASA Service Module
Catalyst 6500 ASA Service ModuleCatalyst 6500 ASA Service Module
Catalyst 6500 ASA Service Module
 
Testing High Performance Firewalls
Testing High Performance FirewallsTesting High Performance Firewalls
Testing High Performance Firewalls
 
BreakingPoint & Stonesoft RSA Conference 2011 Presentation: Evaluating IPS
BreakingPoint & Stonesoft RSA Conference 2011 Presentation: Evaluating IPSBreakingPoint & Stonesoft RSA Conference 2011 Presentation: Evaluating IPS
BreakingPoint & Stonesoft RSA Conference 2011 Presentation: Evaluating IPS
 
Cybersecurity: Arm and Train US Warriors to Win Cyber War
Cybersecurity: Arm and Train US Warriors to Win Cyber WarCybersecurity: Arm and Train US Warriors to Win Cyber War
Cybersecurity: Arm and Train US Warriors to Win Cyber War
 
Harden Security Devices Against Increasingly Sophisticated Evasions
Harden Security Devices Against Increasingly Sophisticated EvasionsHarden Security Devices Against Increasingly Sophisticated Evasions
Harden Security Devices Against Increasingly Sophisticated Evasions
 

Último

08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 

Último (20)

08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 

BreakingPoint 4-Port 1GigE Blade Cost-Effective Testing

  • 1. BreakingPoint Cost-Effective Testing Cost-Effective Security and Performance Testing BreakingPoint Storm CTM™ 4-Port 1GigE Blade Provides Unprecedented Value for Performance and Security Testing The BreakingPoint Storm Cyber Tomography Machine (CTM) is designed to test the performance and security of network and data center devices and systems in order to harden and optimize resiliency. The BreakingPoint Storm CTM 4-Port 1GigE Blade provides the most cost-effective way for any organization to pinpoint previously impossible-to-detect weaknesses and vulnerabilities in networks, network devices, and data centers before they are exploited to wreak havoc within critical IT infrastructures. The BreakingPoint Storm CTM 4-Port 1GigE Blade The 4-port 1GigE blade is used in any BreakingPoint CTM 4U chassis • Session Sender: Measure connection-processing capabilities and provides line-speed performance for blended application for security devices. traffic and live security attacks on all ports. For users who need the • Multicast: Create traffic from streaming media and financial advanced capabilities of blended application traffic, security attacks, services communication protocols. and live malware but don’t require the blistering performance of • Resiliency Score: Measure device performance, security, and the other BreakingPoint Storm CTM or BreakingPoint FireStorm stability on a scientific, objective basis. CTM blades, the 4-port 1GigE blade offers the ideal combination of performance, functionality, and value. • Data Center Resiliency Score: Determine user capacity of virtualized servers using real-world applications. Besides offering 4 ports of authentic line-speed traffic, the 4-port Enterprises, government agencies and defense contractors, service 1GigE blade can double in port density and performance through a providers, and network equipment manufacturers rely on the simple license add-on. Furthermore, as performance requirements BreakingPoint Storm CTM 4-Port 1GigE Blade to: evolve, an additional 4- or 8-port 1GigE interface blade or 4-port • Harden network infrastructures by assaulting them with a 10GigE interface blade can be added to the same BreakingPoint custom, global, and current blend of stateful applications, live CTM 4U chassis. security attacks, and high-stress load to probe every weakness and vulnerability. Advanced Capabilities and Ease of Use • Optimize data center resiliency by simulating the behavior of BreakingPoint offers the industry’s fastest time-to-test for virtually millions of users, a crush of real-world applications, and security any scenario. To help users leverage its extensive performance attacks—without deploying racks of servers and costly software. and security testing capabilities, each BreakingPoint CTM features • Evaluate and select the most appropriate network equipment an intuitive user interface and dedicated Test Labs for common for critical infrastructure with standardized and repeatable scenarios such as: product assessments. • Mobility Testing: Create wireless user behavior, application • Measure and harden the resiliency of routers, switches, traffic, and security attacks over 3G and LTE/4G wireless firewalls, IPS and UTM devices, and other equipment by network protocols. subjecting them to real-world conditions prior to deployment • Lawful Intercept/Data Loss Prevention: Validate lawful and after patches or reconfiguration. intercept and data loss prevention systems with multilingual • Audit and maintain standards compliance throughout the life “needle in a haystack” simulation. cycle of network and data center devices. • RFC 2544: Test against industry standards for packet-forwarding • Analyze the impact of traffic on network devices and systems to rates. conduct research and train the next generation of security experts.
  • 2. Comprehensive World-Class Security Unsurpassed Performance Applications 4,500+ Live Security Attacks Simulates millions of users and 150 Applications 27,000 Malware Attacks blended application traf c at Voice/Video/Media 80+ Evasion Techniques line speeds on all ports Database Complete Microsoft Tuesday Coverage Scales to unlimited performance Mail/Messaging levels with multiple chassis managed via a single interface Microsoft File Service Social Media/Gaming > >>> >>>>>>>>> >>>>>>>>> >>>>>>>>> > > >>>> >>> BreakingPoint Storm CTM 4-Port 1GigE Blade Features Stay Current with Comprehensive Applications, Attacks, BreakingPoint produces blended applications and the most current Service, and Support security attacks at global-scale performance levels while emulating BreakingPoint also provides the BreakingPoint Application and millions of users. Each BreakingPoint device: Threat Intelligence (ATI)™ Program, an all-in-one service backed by • Ships with more than 150 application protocols out of the box, a team of security researchers and application protocol engineers, including popular applications such as AOL® IM, BlackBerry® to complement the BreakingPoint Storm CTM. This program keeps Services, Google® Gmail, FIX, IBM® DB2®, VMware® VMotion™, BreakingPoint products updated with the latest security attacks and HTTP, Microsoft® CIFS/SMB, MAPI, BGP, RIP, Oracle®, Encrypted applications, as well as new features and performance add-ons. BitTorrent™, MSN® Nexus, RADIUS, SIP, Skype™, Windows Live® Messenger, World of Warcraft® Yahoo® Mail, Yahoo! Messenger, About BreakingPoint Systems and many others. BreakingPoint cyber security products are the standard by which • Provides 4,500+ live security attacks and 28,000+ pieces of the world’s governments, enterprises, and service providers malware—including mobile malware—out of the box, with optimize and harden the resiliency of their cyber infrastructures. new attacks made available weekly, and the industry’s only Learn more about BreakingPoint products and services by full coverage for Microsoft security updates within 24 hours of contacting a representative in your area. announcement. • Enables sophisticated attack simulation with more than 100 1.866.352.6691 U.S. Toll Free evasions, botnet-driven distributed denial of service (DDoS) www.breakingpoint.com attacks, and more. • Scales to unlimited performance levels with multiple chassis managed via a single interface and configuration, with integrated reporting.
  • 3. BreakingPoint Cost-Effective Testing BreakingPoint Storm CTM with 4-Port 1GigE Blade Specifications Selected Performance Information System Configuration and Expansion Options • 4 gigabits per second of stateful application traffic • 4U chassis with 1 system controller • 7.5 million concurrent flows • Up to 2 interface blades per chassis: • 21,000 SSL transactions per second • 1 GigE Interface blade • 4 ports BreakingPoint Storm CTM Physical Specifications • SFP interfaces • Rack Units: 4 • 1 GB of capture buffer per port • Installed: 17.4 in W x 7 in H x 19.5 in D • Expansion options: (44.2 cm W x 17.8 cm H x 49.8 cm D) • 1GigE Interface blade (as above) • Shipping Weight: 45 lb (20.4 kg) • 4-port add-on kit to expand to 8 ports • Operating Environment: 15° C to 40° C • 1GigE Interface blade • Nonoperating Environment: -20° C to 70° C • 8 ports • Power Requirements: 100 – 240V, 50/60 Hz • SFP interfaces • Maximum Power Consumption: 1200W • 1 GB of capture buffer per port • Regulatory Approvals: FCC Class A, CE, EN60950 • 10GigE Interface blade • 4 ports • XFP interfaces • 2 GB of capture buffer per port www.breakingpoint.com © 2005 – 2011. BreakingPoint Systems, Inc. All rights reserved. The BreakingPoint logo is a trademark of BreakingPoint Systems, Inc. All other trademarks are the property of their respective owners.