BreakingPoint unleashes Internet-scale mayhem in a controlled environment to enable you to measure—with precision—how networks and the devices that support them will perform when faced with increasing user traffic, dynamic applications, and sophisticated attacks. BreakingPoint’s patented design unlocks the power of network processor technology to produce alwayscurrent,
application-rich traffic on a scale never before seen in a small product. Using these extreme conditions, you can quickly and cost-effectively harden virtualized security, network, and application infrastructures while optimizing delivery of services for customers.
The 7 Things I Know About Cyber Security After 25 Years | April 2024
BreakingPoint Cloud and Virtualization Data Sheet
1. Is Your Cloud Infrastructure Resilient Against
Cyber Attack and High-Stress Application Traffic?
Use the BreakingPoint FireStorm CTM™ to measure, harden, and optimize the performance, security, and
stability of your virtualized infrastructure
The Promise and Perils of Cloud Computing
Cloud and virtualized environments promise a massive shared
network and application infrastructure that provide all the
benefits of dynamic resource allocation. Yet these environments,
while distributing software, infrastructures, and platforms as a
service, also lead to a highly variable and often unpredictable
pool of users—as well as uncertain exposure to security threats.
Understanding exactly how a cloud or virtualized environment
will work is dependent on validating it with mixes of user load,
application traffic, and attacks tailored to the unique conditions
affecting that infrastructure.
the power of network processor technology to produce always-
The Cloud Resiliency Imperative: Rethink Legacy Testing current, application-rich traffic on a scale never before seen in a
Approaches small product. Using these extreme conditions, you can quickly
When building a cloud or virtualized environment, it is also and cost-effectively harden virtualized security, network, and
important to understand the impact of this migration on cost, application infrastructures while optimizing delivery of services for
performance, and stability. In the past, determining if the move customers.
to a virtualized or cloud environment was right for your business
required racks and racks of servers and a multitude of application The BreakingPoint FireStorm CTM’s capabilities have been honed
licenses to simulate a realistic load. In an attempt to gather this in the performance labs of Global 2000 companies, government
insight, cloud vendors have also relied on legacy tools, many agencies, and the defense industrial base. Our customer base
originally designed for traditional LAN-based environments, as includes:
well as solutions that do not send real-world application traffic or • the major network equipment manufacturers that produce
assess the impact of security attacks. The net result: a collection of the building blocks for the cloud,
tools and workarounds that is costly and brittle, and does not scale
to address the task at hand. • service providers who operate the most massive networks in
the world, and
The Advantages of Cyber Tomography and the BreakingPoint • top vendors of cloud services.
FireStorm CTM
Today, one compact BreakingPoint FireStorm Cyber Tomography This background gives BreakingPoint an unparalleled
Machine (CTM) simulates blended application traffic at 120 understanding of today’s networks and the complex interactions
gigabits per second (Gbps) and the load from 90 million within them.
concurrent users making online purchases, sending emails,
streaming HD movies, inputting inventory orders, and managing BreakingPoint Advantages
customer records using a cloud infrastructure—among thousands These are a few of the many benefits provided by the
of other scenarios. By simulating exact Internet-scale conditions, BreakingPoint FireStorm CTM:
the BreakingPoint FireStorm CTM is the only product capable of • Performance and Scalability — The BreakingPoint FireStorm
optimizing and hardening cloud and virtualized environments. CTM assaults your cloud infrastructure with 120 Gbps of
Only at this level of performance and realism can enterprises truly
stateful application traffic and 90 million concurrent TCP
determine if the move to a cloud-based infrastructure will pay off
in the long run. sessions, replicating the load and behavior of millions of users
from a compact 3-slot chassis device.
BreakingPoint, the Answer for Cloud Computing Resiliency • Dynamic, Real-World Application Traffic — BreakingPoint
BreakingPoint unleashes Internet-scale mayhem in a controlled provides more than 150 application protocols, including AOL®
environment to enable you to measure—with precision—how
IM, Google® Gmail, FIX/FIXT, IBM® DB2®, VMware® VMotion™,
networks and the devices that support them will perform when
faced with increasing user traffic, dynamic applications, and RADIUS, SIP, RTSP, RTP, HTTP, SSL, Facebook®, Skype™, and
sophisticated attacks. BreakingPoint’s patented design unlocks many others. These protocols—plus thorough protocol