4

Click here to load reader

BreakingPoint Application and Security Test … point_0.pdfBreakingPoint Application and Security Test Solutions In today's world of crippling cyber-attacks and dynamic applications,

Embed Size (px)

Citation preview

Page 1: BreakingPoint Application and Security Test … point_0.pdfBreakingPoint Application and Security Test Solutions In today's world of crippling cyber-attacks and dynamic applications,

BreakingPoint Application and Security Test Solutions

In today's world of crippling cyber-attacks and dynamic applications, organizations need to know that their networks aresecure enough to handle the worst that cyber criminals can throw at them. BreakingPoint provides test solutions to helpenterprises, service providers, and equipment manufacturers:

Optimize firewall and other intrusion prevention systems (IPS) and security devices

Mitigate distributed denial of service (DDoS) and other attacks

Build networks and cloud infrastructures that are resilient to attacks

Perform "bake-off" evaluations on how next-generation firewalls and other security devices perform on a particularnetwork

Validate and harden large 3G and 4G/LTE networks under the most realistic conditions

Now, with the new PerfectStorm Fusion load modules and XGS12 chassis, BreakingPoint is an all-in-one security andperformance testing platform for massive-scale, stateful layer 4-7 application and security testing. It is the only system thatprovides modular scalability that achieves near Terabit levels of mixed application and malicious traffic to test all elements oftoday’s complex data centers.

With PerfectStorm, Ixia delivers the first platform to seamlessly unify the IxLoad and BreakingPoint software applications into asingle, more powerful system-one that can validate every element of the data center to ensure the secure delivery of mission-critical applications that today's users demand.

With BreakingPoint, you'll gain a global visibility into emerging threats and applications, along with advance insight into theresiliency of an organization's IT infrastructure under operationally-relevant conditions and malicious attacks.

The BreakingPoint ATI program provides updates every 2 weeks, ensuring delivery of the industry's most up to dateapplication and threat intelligence, including 200+ stateful application protocols, 6,000+ real-world attacks, and 35,000+ livemalware samples found in enterprise, core, and mobile networks.

BreakingPoint solutions include:

Firewall Test — Firewall test solutions generate stateful application traffic, live security attacks, and massive-scale userload to validate firewall devices.

IPS Test — IPS test solutions validate performance and function of intrusion prevention system devices under real-world conditions, prior to and after deployment.

Device Evaluation — Device evaluation solutions simulate real-world user traffic, at load, to determine how a device willperform when it goes live into production.

DDoS Mitigation — DDoS mitigation solutions ensure that next-gen firewalls, IPS devices, anti-DDoS appliances, andother devices recognize and block malicious traffic.

DoS Test — DoS test solutions include evaluation services that help enterprises evaluate the effectiveness of theirsecurity infrastructure

DLP Test — Data loss prevention (DLP) test solutions simulate real-world application traffic, user behavior, and any typeof sensitive data in embedded text or attached files.

Cyber Range — Cyber range solutions simulate Internet-scale cyber warfare scenarios to help you model and researchadvanced cyber threats and train cyber warriors.

Cyber Security Training — Cyber security training offers a standardized curriculum for the dynamic and real-worldexercises needed to build skills and hone cyber warrior instincts.

Lawful Intercept Test — Lawful intercept test solutions simulate real-world application traffic found in lawful interceptsystems and trigger content in multiple languages.

Page 2: BreakingPoint Application and Security Test … point_0.pdfBreakingPoint Application and Security Test Solutions In today's world of crippling cyber-attacks and dynamic applications,

Network Security Test — Network security test solutions emulate malicious and normal user traffic to harden theresiliency of devices and network infrastructure.

Application Load Test — Application testing solutions ensure the quality and security of multiplay services, applicationdelivery platforms, and security systems.

Server Load Test — Server load testing validates the performance and security of IT infrastructures with real-worldapplication traffic and attacks at line rate.

IPv6 Test — IPv6 test solutions emulate IPv4, IPv6, and transitional dual-stack network protocols to evaluate thereadiness of each device, system, or network.

Pre-Deployment Test — Pre-deployment testing enables in-depth benchmarking and analysis to design, develop, anddeliver quality and cost-effective networks and systems.

BreakingPoint products include:

PerfectStorm ONE™ 1GE/10GE Appliance Enterprise-Scale Application and Security Testing – Anywhere, Anytime

PerfectStorm ONE™ 10GE/40GE Appliance Enterprise-Scale Application and Security Testing – Anywhere, Anytime

PerfectStorm Fusion ( PS10GE8NG ), 10GE 8-port Load Module - high-performance application and security loadmodule with 80Gbps per blade, 960Gbps per XGS12 chassis

PerfectStorm Fusion ( PS40GE2NG ), 40GE 2-port Load Module - high-performance application and security loadmodule with 80Gbps per blade, 960Gbps per XGS12 chassis

BreakingPoint Firestorm20, 10GE/1GE 20-port Load Module - high-performance application and security blade with40Gbps per blade, 120Gbps per Firestorm chassis

BreakingPoint FireStorm ONE, 10GE/1GE 4-port Appliance – high-performance application and security blade with40Gbps per appliance; portable form-factor with optional travel case

BreakingPoint 10GigE Storm, 10GE 4-port Load Module – application and security blade with 20Gbps per blade,40Gbps per Firestorm chassis

BreakingPoint 1GigE Storm, 1GE 8-port Load Module - application and security blade with 16Gbps per blade, 32Gbpsper Firestorm chassis

Application and Threat Intelligence - Intelligence subscription service

Page 3: BreakingPoint Application and Security Test … point_0.pdfBreakingPoint Application and Security Test Solutions In today's world of crippling cyber-attacks and dynamic applications,

Solution Briefs

NSS Labs Test Packs for Ixia BreakingPoint

Ensuring Successful Data Center Consolidation with Application and Security Testing

Validating Lawful Intercept Systems

Ixia Cyber Range Services

Ixia Security Testing Solutions

Ensuring Mobile Network Intelligence with Real-world DPI Testing

BreakingPoint Solutions

DDoS Defense Validation Services for the Enterprise

PerfectStorm™ – Massive-Scale, Stateful Layer 4-7 Application and Security Testing

Data Sheets

4-port 1GE

ATI Program

Device Evaluation

Evergreen

Ixia BreakingPoint FireStorm

LTE

FireStorm 20

BreakingPoint Storm Guide

Harden Your Network Against Cyber Attacks

Ixia BreakingPoint Storm Data Sheet

Load Module

Cloud Testing

Custom Application ToolKit

Custom Strike ToolKit

Ixia BreakingPoint FireStorm ONE™

Government

PerfectStorm™ Fusion 40GE/10GE for BreakingPoint

White Papers

Cyber Range: Improving Network Defense and Security Readiness; Real-World Attack Scenarios for Cyber SecurityTraining - Achieve cyber range testing and training without the need for the quickly-outdated and vast test beds of pastcyber ranges. Learn about architectures and scenarios associated with typical cyber range deployments and how youcan achieve the most benefit out of your cyber range.

Network Testing with Simulated Traffic. Does Realism Matter? - Today, most devices include advanced features thatmay make them susceptible to influence by test data content. It is vital to make the data used in testing any device asrealistic as possible.

DDoS Defenders: Don't Take DNS for Granted - This paper by Ixia and Infoblox takes a look at challenges to defendingDNS systems against DDoS attacks. Includes a seven-step plan for ensuring DNS defenses in service providernetworks.

Mobile Broadband Networks: An Aggregated View of Wireless Application and Network Traffic for Global MobileNetwork Operators (MNOs) - The paper outlines the traffic that mobile networks are transporting and outlines the stepsBreakingPoint has taken to help MNOs and equipment manufacturers measure the resiliency of their network

Page 4: BreakingPoint Application and Security Test … point_0.pdfBreakingPoint Application and Security Test Solutions In today's world of crippling cyber-attacks and dynamic applications,

equipment and systems to ensure that they perform as expected.

Real-World Testing of Next-Generation Firewalls (A SANS Analyst Whitepaper, by Dr. Eric Cole)

A Six-Step Plan for Competitive Device Evaluations - Presents a methodology for conducting competitive productevaluations that provide advance insight into the performance, security, and stability of devices within production networkand data center environments.

Accelerating the Deployment of the Evolved Cyber Range

Security Testing for Financial Institutions - A discussion of the network security threats facing financial institutions, andsuggestions for pre-emptive testing to guard against attack.

The CISO’s Guide to Job Security - Examines the role that actionable securityintelligence (ASI) plays in helping CISOsto assess and defend both thecompany security and their own job security.

Application Notes

Creating a Test Series Using Ixia BreakingPoint Hardware

Validating Malware Signature Installations on Ixia BreakingPoint Hardware

Brochures

Ixia Solutions Brochure - Provides an overview of Ixia's verification and visibility solutions used to design, verify, andmonitor a broad range of wired, Wi-Fi, and 3G/LTE equipment and networks.

Global Support Brochure

Ixia Professional Services for Enterprise IT

Ixia Worldwide Education Services

Case Study

Yahoo! Ensures Performance, Security, and Stability of Network Equipment and Cloud Infrastructure

University of Wisconsin Simplifies and Improves Next-Generation Firewall Evaluation and Configuration

Telecom Equipment Manufacturer Accelerates Development and Testing of LTE/4G Network Products Using IxiaBreakingPoint

Northrop Grumman UK Leverages BreakingPoint to Deliver Federated Cyber Range

Korea Telecom Hardens Network Defenses Against Distributed Denial of Service (DDoS) Attacks

Fortune 100 Bank Formalizes Network and Application Infrastructure Resiliency Practice

Major European Bank Ensures Resiliency of Online Services Throughout Data Center Consolidation

Consumer Financing Company Uses BreakingPoint to Solve Data Center Security Crisis

Cisco Reduces Testing Costs and Eliminates Complexity in Development of Next-GenerationFirewall/IPS

Singapore Polytechnic Partners with Ixia to Raise the Bar in IT Security Training and Validation of NetworkResiliency

Dan Thormondsgaard, VP Solutions Architecture at FishNet Security, discusses how Ixia BreakingPoint validates itsenterprise solutions, opening new opportunities and shortening FishNet’s sales cycle from months, down to a week.

Ixia DDoS Attack

Interop NOC – High Availability and DDoS Firewall Protection from F5 Networks

Watch as F5's Ken Bocchino tries to take down the Interop 2013 conference production network by launching an actual denialof service (DoS) attack on it using Ixia BreakingPoint.

In this webinar, Ixia joins F5 to address the universal need for enterprises to deepen their defense against cyber attacks. Thisvideo will help you to better understand the tools and tactics used by DDoS attackers, which DDoS defenses to consider, andhow to verify and tune your network.