breakingpoint storm ctm 4-port blade

3
BreakingPoint Cost-Effective Testing Cost-Effective Security and Performance Testing BreakingPoint Storm CTM™ 4-Port 1GigE Blade Provides Unprecedented Value for Performance and Security Testing The BreakingPoint Storm Cyber Tomography Machine (CTM) is designed to test the performance and security of network and data center devices and systems in order to harden and optimize resiliency. The BreakingPoint Storm CTM 4-Port 1GigE Blade provides the most cost-effective way for any organization to pinpoint previously impossible-to-detect weaknesses and vulnerabilities in networks, network devices, and data centers before they are exploited to wreak havoc within critical IT infrastructures. The BreakingPoint Storm CTM 4-Port 1GigE Blade The 4-port 1GigE blade is used in any BreakingPoint CTM 4U chassis and provides line-speed performance for blended application traffic and live security attacks on all ports. For users who need the advanced capabilities of blended application traffic, security attacks, and live malware but don’t require the blistering performance of BreakingPoint’s other full-performance Storm and FireStorm CTM blades, the 4-port 1GigE blade offers the ideal combination of performance, functionality, and value. The 4-port 1GigE blade offers 4 ports of line-speed blended application and security traffic and, through a simple license add- on, the port density and performance of the blade can be doubled. Furthermore, as performance requirements evolve, supplementary 4- and 8-port 1GigE interface blades or 4-port 10GigE interface blades can be added to the BreakingPoint CTM 4U chassis. Advanced Capabilities and Ease-of-Use To help users leverage its extensive performance and security testing capabilities, BreakingPoint offers the industry’s lowest time-to-test for any scenarios, with an intuitive user interface and dedicated Test Labs for common scenarios such as: Mobility Testing: Create wireless user behavior, application traffic, and security attacks over 3G and 4G wireless network protocols Lawful Intercept/Data Loss Prevention: Validate lawful intercept and data loss prevention systems with multilingual “needle in a haystack” simulation RFC 2544: Test against industry-standard packet forwarding rates Session Sender: Measure connection-processing capabilities for security devices Multicast: Create traffic from streaming media and financial services communication protocols Resiliency Score: Scientific, objective measurement of device performance, security, and stability Data Center Resiliency Score: Measure user capacity of virtualized servers using real-world applications Enterprises, government agencies, and defense contractors, service providers, and network equipment manufacturers rely on the BreakingPoint Storm CTM 4-Port 1GigE Blade to: Harden network infrastructures by assaulting them with a custom, global, and current blend of stateful applications, live security attacks, and high stress load to probe every weakness and vulnerability Optimize data center resiliency by simulating the behavior of millions of users, a crush of real-world applications, and security attacks—all without deploying racks of high-speed servers and costly software Evaluate and select the most appropriate network equipment for critical infrastructure with standardized, repeatable, and deterministic product assessments Measure and harden the resiliency of routers, switches, firewalls, IPS and UTM devices, and other equipment by subjecting them to real-world conditions prior to deployment and after patches or configuration changes

Upload: breakingpoint

Post on 06-Mar-2015

129 views

Category:

Documents


1 download

DESCRIPTION

The BreakingPoint Storm CTM 4-Port 1GigE Blade provides the most cost-effective way for any organization to pinpoint previously impossible-to-detect weaknesses and vulnerabilities in networks, network devices, and data centers before they are exploited to wreak havoc within critical IT infrastructures.

TRANSCRIPT

Page 1: BreakingPoint Storm CTM 4-Port Blade

BreakingPoint Cost-Effective Testing

Cost-Effective Security and Performance TestingBreakingPoint Storm CTM™ 4-Port 1GigE Blade Provides Unprecedented Value for Performance and Security Testing

The BreakingPoint Storm Cyber Tomography Machine (CTM) is designed to test the performance and security of network and data center devices and systems in order to harden and optimize resiliency. The BreakingPoint Storm CTM 4-Port 1GigE Blade provides the most cost-effective way for any organization to pinpoint previously impossible-to-detect weaknesses and vulnerabilities in networks, network devices, and data centers before they are exploited to wreak havoc within critical IT infrastructures.

The BreakingPoint Storm CTM 4-Port 1GigE BladeThe 4-port 1GigE blade is used in any BreakingPoint CTM 4U chassis and provides line-speed performance for blended application traffic and live security attacks on all ports. For users who need the advanced capabilities of blended application traffic, security attacks, and live malware but don’t require the blistering performance of BreakingPoint’s other full-performance Storm and FireStorm CTM blades, the 4-port 1GigE blade offers the ideal combination of performance, functionality, and value.

The 4-port 1GigE blade offers 4 ports of line-speed blended application and security traffic and, through a simple license add-on, the port density and performance of the blade can be doubled. Furthermore, as performance requirements evolve, supplementary 4- and 8-port 1GigE interface blades or 4-port 10GigE interface blades can be added to the BreakingPoint CTM 4U chassis.

Advanced Capabilities and Ease-of-UseTo help users leverage its extensive performance and security testing capabilities, BreakingPoint offers the industry’s lowest time-to-test for any scenarios, with an intuitive user interface and dedicated Test Labs for common scenarios such as:• Mobility Testing: Create wireless user behavior, application

traffic, and security attacks over 3G and 4G wireless network protocols

• Lawful Intercept/Data Loss Prevention: Validate lawful intercept and data loss prevention systems with multilingual “needle in a haystack” simulation

• RFC 2544: Test against industry-standard packet forwarding rates

• Session Sender: Measure connection-processing capabilities for security devices

• Multicast: Create traffic from streaming media and financial services communication protocols

• Resiliency Score: Scientific, objective measurement of device performance, security, and stability

• Data Center Resiliency Score: Measure user capacity of virtualized servers using real-world applications

Enterprises, government agencies, and defense contractors, service providers, and network equipment manufacturers rely on the BreakingPoint Storm CTM 4-Port 1GigE Blade to:• Harden network infrastructures by assaulting them with a

custom, global, and current blend of stateful applications, live security attacks, and high stress load to probe every weakness and vulnerability

• Optimize data center resiliency by simulating the behavior of millions of users, a crush of real-world applications, and security attacks—all without deploying racks of high-speed servers and costly software

• Evaluate and select the most appropriate network equipment for critical infrastructure with standardized, repeatable, and deterministic product assessments

• Measure and harden the resiliency of routers, switches, firewalls, IPS and UTM devices, and other equipment by subjecting them to real-world conditions prior to deployment and after patches or configuration changes

Page 2: BreakingPoint Storm CTM 4-Port Blade

B

• Identify and remediate problem areas that require tuning and confi guration changes

• Audit and maintain standards compliance throughout the life cycle of network devices

• Analyze the impact of traffi c on network devices and systems to conduct research and train the next generation of security experts

BreakingPoint Storm CTM 4-Port 1GigE Blade FeaturesBreakingPoint produces blended applications and the most current security attacks at global-scale performance levels while emulating millions of users.• Ships with more than 150 application protocols out of the box,

including popular applications such as AOL® IM, BlackBerry® Services, Google® Gmail, FIX, Gnutella, IBM® DB2® VMware® VMotion™, HTTP, Microsoft® CIFS/SMB, MAPI, Oracle® Encrypted BitTorrent™, eDonkey, MSN® Nexus, RADIUS, SIP, Skype™, Windows Live® Messenger, World of Warcraft® Yahoo® Mail, Yahoo! Messenger, and many others

• Provides 30,000+ live security attacks and malware out of the box, with new attacks made available weekly, and the industry’s only full coverage for Microsoft security updates within 24 hours of announcement

• Enables sophisticated attack simulation with more than 100 evasions, botnet-driven distributed denial of service (DDoS) attacks, and more

• Simulates millions of users and blended application traffi c at line speeds on all ports

• Scales to unlimited performance levels with multiple chassis managed via a single interface and confi guration, with integrated reporting

Score Network, Data Center, and Device Resiliency with Standardized Scientifi c MeasurementsThe BreakingPoint Storm CTM produces the BreakingPoint Resiliency Score™, a deterministic, scientifi c, and repeatable measurement of network resiliency.• Features the BreakingPoint Resiliency Score Lab, a wizard-

like interface for standardizing measurement of devices and networks with virtually no confi guration eff ort

• Enables customers to maintain ongoing resiliency by scoring and remediating issues as performance and security coverage trend lower over time

>

>> > > > >> >>>>>>>>>>>>>>>>>>

>>> >>> >>

>

>>>>>

>

>>>>>>>

>>>>> >>>>>

>>

>>

>>

>

>

>>>>>>

>>>>

>

>

>

>>

150 ApplicationsVoice/Video/MediaDatabaseMail/MessagingMicrosoft File ServiceSocial Media/Gaming

Unsurpassed PerformanceSimulates millions of users andblended application traf�c atline speeds on all portsScales to unlimited performancelevels with multiple chassis managed via a single interface

4,500+ Live Security Attacks27,000 Malware Attacks80+ Evasion TechniquesComplete Microsoft Tuesday Coverage

>>>

>>>>>> >>

Page 3: BreakingPoint Storm CTM 4-Port Blade

BreakingPoint Cost-Effective Testing

www.breakingpoint.com© 2005 – 2011. BreakingPoint Systems, Inc. All rights reserved. The BreakingPoint logo is a trademark of BreakingPoint Systems, Inc.All other trademarks are the property of their respective owners.

BreakingPoint Storm CTM with 4-Port 1GigE Blade SpecificationsSystem Configuration• 4U chassis with 1 system controller

• Up to 2 interface blades per chassis:

• 1 GigE Interface blade

• 4 ports

• SFP interfaces

• 1 Gigabyte of capture buffer per port

• Expansion options include license add-on for 4 additional ports and additional blades

• 1GigE Interface blade

• 4 ports

• SFP interfaces

• 1 Gigabyte of capture buffer per port

• License add-on to 8 ports

• 1GigE Interface blade

• 8 ports

• SFP interfaces

• 1 Gigabyte of capture buffer per port

• 10GigE Interface blade

• 4 ports

• XFP interfaces

• 2 Gigabytes of capture buffer per port

BreakingPoint Storm CTM Physical Specifications• Rack Units: 4

• Installed: 17.4 in W x 7 in H x 19.5 in D (44.2 cm W x 17.8 H x 49.8 cm D)

• Shipping Weight: 45 lbs. (20.4 kg)

• Operating Environment: 15° C to 40° C

• Nonoperating Environment: -20° C to 70° C

• Power Requirements: 100 – 240V, 50/60 Hz

• Maximum Power Consumption: 1200W

• Regulatory Approvals: FCC Class A, CE, EN60950

Lower Total Cost of Ownership All BreakingPoint CTM products are architected to adapt rapidly to change and ensure ongoing resiliency with the latest applications, security attacks, product features, and performance add-ons.• All-inclusive pricing includes access to all applications and

security attacks required for real-world simulations.

• Products are backed by a dedicated group of security researchers and application protocol engineers committed to keeping the products completely current with frequent strike and protocol updates.

• Interface is easy to use by staff at all skill levels, from IT and security researchers to experts and technical marketing professionals.

• Automated point-and-click capabilities and a library of prebuilt profiles reduce configuration time.

• Devices scale easily to replace costly server farms or cyber range operations with a small, easy-to-maintain product

Stay Current with Comprehensive Applications, Attacks, Service, and SupportBreakingPoint also provides the BreakingPoint Application and Threat Intelligence (ATI)™ Program, an all-in-one service backed by a team of security experts, to complement the BreakingPoint Storm CTM. This program keeps BreakingPoint products updated with the latest security attacks and applications, as well as new features and performance add-ons.

About BreakingPoint SystemsBreakingPoint cyber security products are the standard by which the world’s governments, enterprises, and service providers optimize and harden the resiliency of their cyber infrastructures. Learn more about BreakingPoint products and services by contacting a representative in your area.1.866.352.6691 U.S. Toll Freewww.breakingpoint.com