SlideShare una empresa de Scribd logo
1 de 2
Descargar para leer sin conexión
BreakingPoint Storm CTM™:
                                                                                           The Alternative to Costly and Complex Cyber Ranges




The BreakingPoint Storm CTM™: The Alternative to
Costly and Complex Cyber Ranges
Unleash Internet-scale cyber war in a controlled environment to measure the resiliency of network and data
center infrastructures, advance research and development, and train cyber warriors


Cyber ranges are critical tools for hardening the resiliency—security,   attack. With its innovative, future-proof approach to delivering the
stability, and performance—of vital government, military, and            capabilities of a traditional cyber range from a 3-slot chassis, a single
intelligence cyber infrastructures. Yet cyber ranges require massive     BreakingPoint Storm CTM emulates a complete global network with:
amounts of disparate equipment from multiple vendors, large                 •	 A blend of stateful application and malicious traffic at 40
numbers of skilled personnel, and long development and testing                 Gigabits per second
cycles. In the past, only this resource-intensive approach could           •	 An always-current mix of traffic from hundreds of real-world
generate the real-world conditions needed to harden defenses                  application protocols and thousands of attacks
against the full spectrum of cyber threats.                                •	 The ability to create and accelerate custom applications and
                                                                              attacks
Building and maintaining a cyber range by throwing hardware                •	 More than 30 million concurrent TCP sessions to emulate
and personnel at the problem is a costly and wasteful exercise. This          millions of users
inefficiency does not make sense in an era of flattened defense            •	 Comprehensive security coverage including attacks, fuzzing,
budgets and scarce human resources. More importantly, this                    malware, obfuscations, and evasions
approach simply cannot scale to address traffic volume and attacks         •	 Built-in traffic profiles and use-case methodologies to
that are multiplying in both quantity and complexity. These realities         accelerate productivity
mandate a new model for the modern cyber range—a “leap-ahead”
technological approach that unleashes Internet-scale cyber war           Exclusive Capabilities
from a single comprehensive, easy-to-maintain device.                    Attack, measure, and harden the resiliency of network and data
                                                                         center infrastructures with unprecedented performance and
The BreakingPoint Storm CTM: Complete Cyber Range                        realism.
Functionality and Massive Scale in a Small Footprint                       •	 Only the BreakingPoint Storm CTM can emulate your own
The BreakingPoint Cyber Tomography Machine (CTM) answers this                 large-scale network conditions with the performance, stateful
challenge because it embodies the power and scope of a cyber                  applications, and current attacks needed to fully validate the
range, but without requiring multi-million-dollar expenditures                deep packet inspection (DPI) technologies prevalent in today’s
and teams of engineers to set up and maintain. The patented                   networks and data centers.
BreakingPoint Storm CTM is used by government and military                 •	 The product includes more than 150 application protocols,
organizations, as well as leading defense contractors, global                 including AOL® IM, Yahoo!® Mail and Messenger, Google® Gmail,
enterprises, and service providers, to harden networks and data               Skype®, BitTorrent™, eDonkey, RADIUS, SIP, mobile network,
centers to be resilient in the face of escalating application load and        social network, and gaming protocols. It also provides more
                                                                              than 4,500 attacks and is backed by an Application and Threat
                                                                              Intelligence research team dedicated to keeping applications
                                                                              and attacks current, delivering Microsoft Tuesday coverage, and
                                                                              providing frequent feature and performance enhancements.
                                                                           •	 The integrated BreakingPoint Resiliency Score™ provides
                                                                              standardized and repeatable measurements of the security,
                                                                              stability, and performance of every component of networks
                                                                              and data centers. Developed using standards by organizations
                                                                              such as US–CERT, IEEE, and the IETF, as well as insight into traffic
                                                                              from the world’s largest service providers, it provides advance
                                                                              insight into how your product or environment will be impacted
BreakingPoint Storm CTM™:
                                                                                                                       The Alternative to Costly and Complex Cyber Ranges


     by changes such as peak user load, network reconfiguration,                                      simulated Distributed Denial of Service (DDoS) and botnet
     and new security attacks.                                                                        attacks, and leverage the BreakingPoint Custom Toolkits to
  •	 The BreakingPoint Storm CTM subjects massive virtualized                                         develop and accelerate your own applications and attacks.
     infrastructures to peak user load and attack to evaluate and                                 •	 Emulate, attack, and evaluate network operations and security
     optimize the resiliency of cloud services.                                                      defenses at any level of detail using one of the industry’s largest
  •	 It also includes an easy-to-use automated lab for validating                                    packet capture buffers.
     Lawful Intercept and Data Loss Prevention solutions using a
                                                                                               BreakingPoint Storm CTM Specifications
     digital storm of content from evergreen application protocols
                                                                                               Based on a patented breakthrough in network processor
     and communications in multiple languages.
                                                                                               architecture and backed by a team of network performance and
Conduct advanced and repeatable research and development                                       security experts, only the BreakingPoint Storm CTM produces
experiments with this automated and configurable solution.                                     Internet-scale cyber war conditions in a comprehensive, easy-to-use,
  •	 The BreakingPoint Storm CTM accurately simulates the real-                                and low-maintenance product. This 3-slot chassis device provides
     world scale and complexities of cyber warfare with prebuilt                               the equivalent performance and capabilities of hundreds of racks of
     traffic profiles, real applications and attacks, and the behavior                         high performance servers, including:
     of millions of users to evaluate and accelerate advances in                                  •	 40 Gigabits per second of blended stateful application traffic
     offensive and defensive technologies.                                                        •	 30 million concurrent TCP sessions
  •	 Multiple BreakingPoint Storm CTMs can also be combined                                       •	 1.5 million TCP sessions per second
     using a single interface and a single configuration for even
                                                                                                  •	 80,000+ SSL sessions per second
     greater performance; previous deployments have emulated up
                                                                                                  •	 600,000+ complete TCP sessions per second
     to 300,000,000 Internet users at once.
                                                                                                  •	 150+ stateful application protocols
  •	 The product creates a barrage of unstructured data in multiple
     languages, allowing users to conduct experiments in data                                     •	 4,500+ live security attacks
     detection, intercept, and analysis.                                                       To find out more about what BreakingPoint can do for your
  •	 BreakingPoint also provides a BreakingPoint Custom                                        organization, contact the BreakingPoint Government Solutions
     Application Toolkit and Custom Attack Toolkit to accelerate the                           Group at government@breakingpoint.com, 703.443.1501 or visit
     delivery of custom attacks and proprietary applications, and                              www.breakingpoint.com/demo to schedule an evaluation.
     analyze the results.
  •	 With BreakingPoint’s Psuedo Random Number Generation
     (PRNG) capabilities, users can produce random yet repeatable
     simulations using a PRNG seed to accelerate troubleshooting or
     analyze the effects.
  •	 Automated reporting provides rapid analysis and presentation of
     massive amounts of data to determine exactly what happened
     in each simulation, down to the level of each user simulated.

Evaluate and train cyber warriors by creating sophisticated,
distributed, and current cyber war exercises.
  •	 Just as a physical training ground allows soldiers to
     demonstrate and improve their combat skills, the
     BreakingPoint Storm CTM provides combatant commanders
     a digital environment in which to train, evaluate, and develop
     defensive and offensive capabilities.
  •	 Carry out sophisticated red team / blue team exercises, assess
     information assurance capabilities, measure the quality of incident
     response procedures, and more by simulating real attacks.
  •	 Conduct realistic opposing force (OPFOR) exercises, including



www.breakingpoint.com
© 2005 - 2011. BreakingPoint Systems, Inc. All rights reserved. The BreakingPoint logo is a trademark of BreakingPoint Systems, Inc.
All other trademarks are the property of their respective owners.

Más contenido relacionado

Más de Ixia

IPS Test Methodology
IPS Test MethodologyIPS Test Methodology
IPS Test MethodologyIxia
 
Deep Packet Inspection (DPI) Test Methodology
Deep Packet Inspection (DPI) Test MethodologyDeep Packet Inspection (DPI) Test Methodology
Deep Packet Inspection (DPI) Test MethodologyIxia
 
Load Test Methodology: Server Load Testing
Load Test Methodology: Server Load TestingLoad Test Methodology: Server Load Testing
Load Test Methodology: Server Load TestingIxia
 
IPv6 Test Methodology
IPv6 Test MethodologyIPv6 Test Methodology
IPv6 Test MethodologyIxia
 
Server Load Balancer Test Methodology
Server Load Balancer Test MethodologyServer Load Balancer Test Methodology
Server Load Balancer Test MethodologyIxia
 
How to Test High-Performance Next-Generation Firewalls
How to Test High-Performance Next-Generation FirewallsHow to Test High-Performance Next-Generation Firewalls
How to Test High-Performance Next-Generation FirewallsIxia
 
Catalyst 6500 ASA Service Module
Catalyst 6500 ASA Service ModuleCatalyst 6500 ASA Service Module
Catalyst 6500 ASA Service ModuleIxia
 
Testing High Performance Firewalls
Testing High Performance FirewallsTesting High Performance Firewalls
Testing High Performance FirewallsIxia
 
BreakingPoint & Fortinet RSA Conference 2011 Presentation: Evaluating Enterpr...
BreakingPoint & Fortinet RSA Conference 2011 Presentation: Evaluating Enterpr...BreakingPoint & Fortinet RSA Conference 2011 Presentation: Evaluating Enterpr...
BreakingPoint & Fortinet RSA Conference 2011 Presentation: Evaluating Enterpr...Ixia
 
BreakingPoint & Juniper RSA Conference 2011 Presentation: Securing the High P...
BreakingPoint & Juniper RSA Conference 2011 Presentation: Securing the High P...BreakingPoint & Juniper RSA Conference 2011 Presentation: Securing the High P...
BreakingPoint & Juniper RSA Conference 2011 Presentation: Securing the High P...Ixia
 
BreakingPoint & Stonesoft RSA Conference 2011 Presentation: Evaluating IPS
BreakingPoint & Stonesoft RSA Conference 2011 Presentation: Evaluating IPSBreakingPoint & Stonesoft RSA Conference 2011 Presentation: Evaluating IPS
BreakingPoint & Stonesoft RSA Conference 2011 Presentation: Evaluating IPSIxia
 
BreakingPoint & Juniper RSA Conference 2011 Presentation: Evaluating The Juni...
BreakingPoint & Juniper RSA Conference 2011 Presentation: Evaluating The Juni...BreakingPoint & Juniper RSA Conference 2011 Presentation: Evaluating The Juni...
BreakingPoint & Juniper RSA Conference 2011 Presentation: Evaluating The Juni...Ixia
 
BreakingPoint & Crossbeam RSA Conference 2011 Presentation: Evaluating High P...
BreakingPoint & Crossbeam RSA Conference 2011 Presentation: Evaluating High P...BreakingPoint & Crossbeam RSA Conference 2011 Presentation: Evaluating High P...
BreakingPoint & Crossbeam RSA Conference 2011 Presentation: Evaluating High P...Ixia
 
BreakingPoint & McAfee RSA Conference 2011 Presentation: Data Sheets Lie
BreakingPoint & McAfee RSA Conference 2011 Presentation: Data Sheets LieBreakingPoint & McAfee RSA Conference 2011 Presentation: Data Sheets Lie
BreakingPoint & McAfee RSA Conference 2011 Presentation: Data Sheets LieIxia
 
Cybersecurity: Arm and Train US Warriors to Win Cyber War
Cybersecurity: Arm and Train US Warriors to Win Cyber WarCybersecurity: Arm and Train US Warriors to Win Cyber War
Cybersecurity: Arm and Train US Warriors to Win Cyber WarIxia
 
Firewall Testing Methodology
Firewall Testing MethodologyFirewall Testing Methodology
Firewall Testing MethodologyIxia
 
BreakingPoint Cloud and Virtualization Data Sheet
BreakingPoint Cloud and Virtualization Data SheetBreakingPoint Cloud and Virtualization Data Sheet
BreakingPoint Cloud and Virtualization Data SheetIxia
 
Measure Network Performance, Security and Stability
Measure Network Performance, Security and StabilityMeasure Network Performance, Security and Stability
Measure Network Performance, Security and StabilityIxia
 
Breakingpoint Application Threat and Intelligence (ATI) Program
Breakingpoint Application Threat and Intelligence (ATI) ProgramBreakingpoint Application Threat and Intelligence (ATI) Program
Breakingpoint Application Threat and Intelligence (ATI) ProgramIxia
 
BreakingPoint Custom Application Toolkit
BreakingPoint Custom Application ToolkitBreakingPoint Custom Application Toolkit
BreakingPoint Custom Application ToolkitIxia
 

Más de Ixia (20)

IPS Test Methodology
IPS Test MethodologyIPS Test Methodology
IPS Test Methodology
 
Deep Packet Inspection (DPI) Test Methodology
Deep Packet Inspection (DPI) Test MethodologyDeep Packet Inspection (DPI) Test Methodology
Deep Packet Inspection (DPI) Test Methodology
 
Load Test Methodology: Server Load Testing
Load Test Methodology: Server Load TestingLoad Test Methodology: Server Load Testing
Load Test Methodology: Server Load Testing
 
IPv6 Test Methodology
IPv6 Test MethodologyIPv6 Test Methodology
IPv6 Test Methodology
 
Server Load Balancer Test Methodology
Server Load Balancer Test MethodologyServer Load Balancer Test Methodology
Server Load Balancer Test Methodology
 
How to Test High-Performance Next-Generation Firewalls
How to Test High-Performance Next-Generation FirewallsHow to Test High-Performance Next-Generation Firewalls
How to Test High-Performance Next-Generation Firewalls
 
Catalyst 6500 ASA Service Module
Catalyst 6500 ASA Service ModuleCatalyst 6500 ASA Service Module
Catalyst 6500 ASA Service Module
 
Testing High Performance Firewalls
Testing High Performance FirewallsTesting High Performance Firewalls
Testing High Performance Firewalls
 
BreakingPoint & Fortinet RSA Conference 2011 Presentation: Evaluating Enterpr...
BreakingPoint & Fortinet RSA Conference 2011 Presentation: Evaluating Enterpr...BreakingPoint & Fortinet RSA Conference 2011 Presentation: Evaluating Enterpr...
BreakingPoint & Fortinet RSA Conference 2011 Presentation: Evaluating Enterpr...
 
BreakingPoint & Juniper RSA Conference 2011 Presentation: Securing the High P...
BreakingPoint & Juniper RSA Conference 2011 Presentation: Securing the High P...BreakingPoint & Juniper RSA Conference 2011 Presentation: Securing the High P...
BreakingPoint & Juniper RSA Conference 2011 Presentation: Securing the High P...
 
BreakingPoint & Stonesoft RSA Conference 2011 Presentation: Evaluating IPS
BreakingPoint & Stonesoft RSA Conference 2011 Presentation: Evaluating IPSBreakingPoint & Stonesoft RSA Conference 2011 Presentation: Evaluating IPS
BreakingPoint & Stonesoft RSA Conference 2011 Presentation: Evaluating IPS
 
BreakingPoint & Juniper RSA Conference 2011 Presentation: Evaluating The Juni...
BreakingPoint & Juniper RSA Conference 2011 Presentation: Evaluating The Juni...BreakingPoint & Juniper RSA Conference 2011 Presentation: Evaluating The Juni...
BreakingPoint & Juniper RSA Conference 2011 Presentation: Evaluating The Juni...
 
BreakingPoint & Crossbeam RSA Conference 2011 Presentation: Evaluating High P...
BreakingPoint & Crossbeam RSA Conference 2011 Presentation: Evaluating High P...BreakingPoint & Crossbeam RSA Conference 2011 Presentation: Evaluating High P...
BreakingPoint & Crossbeam RSA Conference 2011 Presentation: Evaluating High P...
 
BreakingPoint & McAfee RSA Conference 2011 Presentation: Data Sheets Lie
BreakingPoint & McAfee RSA Conference 2011 Presentation: Data Sheets LieBreakingPoint & McAfee RSA Conference 2011 Presentation: Data Sheets Lie
BreakingPoint & McAfee RSA Conference 2011 Presentation: Data Sheets Lie
 
Cybersecurity: Arm and Train US Warriors to Win Cyber War
Cybersecurity: Arm and Train US Warriors to Win Cyber WarCybersecurity: Arm and Train US Warriors to Win Cyber War
Cybersecurity: Arm and Train US Warriors to Win Cyber War
 
Firewall Testing Methodology
Firewall Testing MethodologyFirewall Testing Methodology
Firewall Testing Methodology
 
BreakingPoint Cloud and Virtualization Data Sheet
BreakingPoint Cloud and Virtualization Data SheetBreakingPoint Cloud and Virtualization Data Sheet
BreakingPoint Cloud and Virtualization Data Sheet
 
Measure Network Performance, Security and Stability
Measure Network Performance, Security and StabilityMeasure Network Performance, Security and Stability
Measure Network Performance, Security and Stability
 
Breakingpoint Application Threat and Intelligence (ATI) Program
Breakingpoint Application Threat and Intelligence (ATI) ProgramBreakingpoint Application Threat and Intelligence (ATI) Program
Breakingpoint Application Threat and Intelligence (ATI) Program
 
BreakingPoint Custom Application Toolkit
BreakingPoint Custom Application ToolkitBreakingPoint Custom Application Toolkit
BreakingPoint Custom Application Toolkit
 

Último

Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 

Último (20)

Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 

BreakingPoint Storm CTM - The Alternative to Costly and Complex Cyber Range Data Sheet

  • 1. BreakingPoint Storm CTM™: The Alternative to Costly and Complex Cyber Ranges The BreakingPoint Storm CTM™: The Alternative to Costly and Complex Cyber Ranges Unleash Internet-scale cyber war in a controlled environment to measure the resiliency of network and data center infrastructures, advance research and development, and train cyber warriors Cyber ranges are critical tools for hardening the resiliency—security, attack. With its innovative, future-proof approach to delivering the stability, and performance—of vital government, military, and capabilities of a traditional cyber range from a 3-slot chassis, a single intelligence cyber infrastructures. Yet cyber ranges require massive BreakingPoint Storm CTM emulates a complete global network with: amounts of disparate equipment from multiple vendors, large • A blend of stateful application and malicious traffic at 40 numbers of skilled personnel, and long development and testing Gigabits per second cycles. In the past, only this resource-intensive approach could • An always-current mix of traffic from hundreds of real-world generate the real-world conditions needed to harden defenses application protocols and thousands of attacks against the full spectrum of cyber threats. • The ability to create and accelerate custom applications and attacks Building and maintaining a cyber range by throwing hardware • More than 30 million concurrent TCP sessions to emulate and personnel at the problem is a costly and wasteful exercise. This millions of users inefficiency does not make sense in an era of flattened defense • Comprehensive security coverage including attacks, fuzzing, budgets and scarce human resources. More importantly, this malware, obfuscations, and evasions approach simply cannot scale to address traffic volume and attacks • Built-in traffic profiles and use-case methodologies to that are multiplying in both quantity and complexity. These realities accelerate productivity mandate a new model for the modern cyber range—a “leap-ahead” technological approach that unleashes Internet-scale cyber war Exclusive Capabilities from a single comprehensive, easy-to-maintain device. Attack, measure, and harden the resiliency of network and data center infrastructures with unprecedented performance and The BreakingPoint Storm CTM: Complete Cyber Range realism. Functionality and Massive Scale in a Small Footprint • Only the BreakingPoint Storm CTM can emulate your own The BreakingPoint Cyber Tomography Machine (CTM) answers this large-scale network conditions with the performance, stateful challenge because it embodies the power and scope of a cyber applications, and current attacks needed to fully validate the range, but without requiring multi-million-dollar expenditures deep packet inspection (DPI) technologies prevalent in today’s and teams of engineers to set up and maintain. The patented networks and data centers. BreakingPoint Storm CTM is used by government and military • The product includes more than 150 application protocols, organizations, as well as leading defense contractors, global including AOL® IM, Yahoo!® Mail and Messenger, Google® Gmail, enterprises, and service providers, to harden networks and data Skype®, BitTorrent™, eDonkey, RADIUS, SIP, mobile network, centers to be resilient in the face of escalating application load and social network, and gaming protocols. It also provides more than 4,500 attacks and is backed by an Application and Threat Intelligence research team dedicated to keeping applications and attacks current, delivering Microsoft Tuesday coverage, and providing frequent feature and performance enhancements. • The integrated BreakingPoint Resiliency Score™ provides standardized and repeatable measurements of the security, stability, and performance of every component of networks and data centers. Developed using standards by organizations such as US–CERT, IEEE, and the IETF, as well as insight into traffic from the world’s largest service providers, it provides advance insight into how your product or environment will be impacted
  • 2. BreakingPoint Storm CTM™: The Alternative to Costly and Complex Cyber Ranges by changes such as peak user load, network reconfiguration, simulated Distributed Denial of Service (DDoS) and botnet and new security attacks. attacks, and leverage the BreakingPoint Custom Toolkits to • The BreakingPoint Storm CTM subjects massive virtualized develop and accelerate your own applications and attacks. infrastructures to peak user load and attack to evaluate and • Emulate, attack, and evaluate network operations and security optimize the resiliency of cloud services. defenses at any level of detail using one of the industry’s largest • It also includes an easy-to-use automated lab for validating packet capture buffers. Lawful Intercept and Data Loss Prevention solutions using a BreakingPoint Storm CTM Specifications digital storm of content from evergreen application protocols Based on a patented breakthrough in network processor and communications in multiple languages. architecture and backed by a team of network performance and Conduct advanced and repeatable research and development security experts, only the BreakingPoint Storm CTM produces experiments with this automated and configurable solution. Internet-scale cyber war conditions in a comprehensive, easy-to-use, • The BreakingPoint Storm CTM accurately simulates the real- and low-maintenance product. This 3-slot chassis device provides world scale and complexities of cyber warfare with prebuilt the equivalent performance and capabilities of hundreds of racks of traffic profiles, real applications and attacks, and the behavior high performance servers, including: of millions of users to evaluate and accelerate advances in • 40 Gigabits per second of blended stateful application traffic offensive and defensive technologies. • 30 million concurrent TCP sessions • Multiple BreakingPoint Storm CTMs can also be combined • 1.5 million TCP sessions per second using a single interface and a single configuration for even • 80,000+ SSL sessions per second greater performance; previous deployments have emulated up • 600,000+ complete TCP sessions per second to 300,000,000 Internet users at once. • 150+ stateful application protocols • The product creates a barrage of unstructured data in multiple languages, allowing users to conduct experiments in data • 4,500+ live security attacks detection, intercept, and analysis. To find out more about what BreakingPoint can do for your • BreakingPoint also provides a BreakingPoint Custom organization, contact the BreakingPoint Government Solutions Application Toolkit and Custom Attack Toolkit to accelerate the Group at government@breakingpoint.com, 703.443.1501 or visit delivery of custom attacks and proprietary applications, and www.breakingpoint.com/demo to schedule an evaluation. analyze the results. • With BreakingPoint’s Psuedo Random Number Generation (PRNG) capabilities, users can produce random yet repeatable simulations using a PRNG seed to accelerate troubleshooting or analyze the effects. • Automated reporting provides rapid analysis and presentation of massive amounts of data to determine exactly what happened in each simulation, down to the level of each user simulated. Evaluate and train cyber warriors by creating sophisticated, distributed, and current cyber war exercises. • Just as a physical training ground allows soldiers to demonstrate and improve their combat skills, the BreakingPoint Storm CTM provides combatant commanders a digital environment in which to train, evaluate, and develop defensive and offensive capabilities. • Carry out sophisticated red team / blue team exercises, assess information assurance capabilities, measure the quality of incident response procedures, and more by simulating real attacks. • Conduct realistic opposing force (OPFOR) exercises, including www.breakingpoint.com © 2005 - 2011. BreakingPoint Systems, Inc. All rights reserved. The BreakingPoint logo is a trademark of BreakingPoint Systems, Inc. All other trademarks are the property of their respective owners.