april2010 sales presentation

15
Hardening Cyber Infrastructure to Be Resilient Under Hostile Conditions

Upload: toddpruner

Post on 18-Dec-2014

420 views

Category:

Documents


2 download

DESCRIPTION

Presentation describing the technology and customer benefits of the BreakingPoint Storm Cyber Tomography Machine

TRANSCRIPT

Page 1: April2010 Sales Presentation

Hardening Cyber Infrastructure to Be Resilient Under Hostile Conditions

Page 2: April2010 Sales Presentation

BreakingPoint Systems, Inc.

• Founded September 2005• Cyber security leader • Cyber Tomography Machine™ pioneer• 280% year-over-year revenue growth

• Deep networking, security, performance assurance expertise

• Security and Application Research team

• Sales and Support operations:• US Headquarters: Austin, TX• North America• Europe• Asia Pacific

Page 3: April2010 Sales Presentation

The Cyber Threat Pandemic

• Perilous interconnected world • Widespread vulnerabilities • Attacks escalating; morphing to evade detection• Trust has been broken

• Cyber security is hard• Complex and dynamic discipline• More ‘voodoo’ than science • Creating right conditions to measure the

resiliency of your environment is cost prohibitive

• Risks escalating• Theft of billions of dollars and vital intellectual

property• Escalating legal liabilities• Threats to national security

Page 4: April2010 Sales Presentation

The Breakthrough: Cyber Tomography

Exposes previously impossible to

detect vulnerabilities within cyber

infrastructure components before

they are exploited to destroy what is

most important to you:

Customer data

Corporate assets

Brand reputation

National security

Page 5: April2010 Sales Presentation

The BreakingPoint Storm CTM™

BreakingPoint Storm CTM

• 130+ applications • 4,500+ live security attacks• 80+ evasions• 40 Gbps blended application

traffic• 30M concurrent TCP sessions• 1.5M TCP sessions/second

Page 6: April2010 Sales Presentation

BreakingPoint Storm CTM Specifications

• 3-slot chassis• 10GigE interface card

• Four 10GigE ports• XFP interface• 2 GB of capture buffer per port

• 1GigE interface card• Eight 1GigE ports• SFP interface• 1 GB of capture buffer per port

• Mix 10GigE and 1GigE ports

• Multi-user and field upgradable

• Real-time statistics and graphical reports

• 130+ applications; weekly updates

• 4,500+ live security attacks; weekly updates

• Custom applications and attacks

• 80+ evasions

• 40 Gbps of blended application traffic

• 30 million concurrent TCP sessions

• 1.5 million TCP sessions per second

• Scale to unlimited performance levels with one interface, single test configuration and integrated reporting

Page 7: April2010 Sales Presentation

Application and Threat Intelligence

• All inclusive applications and attack updates • Real time traffic monitoring and flow analysis

• Updates downloaded to BreakingPoint product to measure effect on resiliency

• Published methodologies• Service, support, and comprehensive

maintenance

Page 8: April2010 Sales Presentation

Breakthrough Capabilities

Page 9: April2010 Sales Presentation

Harden Network Resiliency

Pam O'Neal
130!!!!
Page 10: April2010 Sales Presentation

Evaluate Devices and Applications

• Product evaluations: Standardized and repeatable resiliency measurement• Development: Validate next generation functionality• Deployment: Validate IPS, Firewall, UTM, and other

devices pre- and post-deployment

• DPI-based applications: Defense and intelligence systems validation • Lawful Intercept• Data Loss Prevention

Page 11: April2010 Sales Presentation

Optimize Data Centers

• Create and analyze the effects of real global-scale conditions on your data center

• Simulate millions of users and multi-gigabit performance • Create a custom, current and global mix of applications and attacks• Scale to simulate massive load with one interface, integrated

reporting

Legacy Server Farm

BreakingPoint Storm CTM

Enterprise

Data Center

Server

Page 12: April2010 Sales Presentation

Maintain Resiliency and Compliance

• Measure ongoing effects of changes and emerging threats on resiliency

• Ensure ongoing compliance with standards

Page 13: April2010 Sales Presentation

Thank You

Questions & Answers

Page 14: April2010 Sales Presentation

Partial List of More Than 130 Applications

ChatAIM6 KeyserverAIM6 RendezvousAIM6 SwitchboardAOL Instant MessengerIRCJabberMSN DispatchMSN NexusMSN NotificationMSN PassportMSN SwitchboardOSCAROSCAR File TransferQQ IMWindows Live MessengerYahoo! Messenger

AuthenticationDIAMETERRADIUS AccountingRADIUS Access

DatabasesIBM DB2InformixMicrosoft SQLMySQLOraclePostgreSQLSybaseTDSTNS

Data TransferFTPGopherHTTPNNTPRSyncTFTP

Data Transfer / File SharingIPPNetBIOSNETBIOS DGMNETBIOS NSNETBIOS SSNNFSRPC NFSSMBSMB/CIFSSMBv2

Email/WebmailAOL WebmailGmailGMX WebmailGMX Webmail AttachmentHotmailHotmail AttachmentIMAPIMAPv4 AdvancedOutlook Web AccessPOP3POP3 AdvancedSMTPYahoo! WebmailYahoo! Mail Attachment

FinancialFIXFIXT

GamesWorld of WarcraftXbox Live

Enterprise ApplicationsDCE/RPC Endpoint MapperDCE/RPC Exchange DirectoryDCE/RPC MAPI ExchangeSAP

Distributed ComputingCitrixDCE/RPCVMware VMotion

Page 15: April2010 Sales Presentation

Partial List of More Than 130 Applications

Remote AccessRDPRFBRLogin

Telnet

Secure Data TransferHTTPSSSH

Voice/MediaH.225.0H.225 RASH.245MMS MM1RTCPRTPRTP Unidirectional StreamRTSPSIPSkypeSkype UDP HelperSTUN

TelephonySMPPMM1H.323

System/Network AdminDNSDNS (Deprecated)IDENTFingerLDAPNTPRPC BindRPC MountSNMPSNMPv1Sun RPCSyslogTime

Testing and MeasurementChargenDaytimeDiscardEchoOWAMP ControlOWAMP TestQOTDTWAMP ControlTWAMP Test

Social NetworkingTwitter

Peer-to-PeerAppleJuiceBitTorrent PeerBitTorrent TrackerBitTorrenteDonkeyGnutella LeafGnutella UltrapeerPPLive/QQLiveWinNY

MobileHTTP MobileBlackBerry ServicesBBC iPlayerApple App StoreAndroid Market