breakingpoint storm ctm data sheet

2
BreakingPoint Storm CTM™ At A Glance BreakingPoint introduced the world’s first Cyber Tomography Machine (CTM), designed for the world in which we live—a perilously interconnected universe with escalating network traffic and cyber attacks from a growing list of enemies. It is the only product that allows you to pinpoint previously impossible-to-detect weaknesses and vulnerabilities in networks, network devices, and data centers before they are exploited to wreak havoc within critical network infrastructures. BreakingPoint Provides a Virtual CT Scan for Your Network Much as a medical computed tomography or CT scan requires the injection of dyes and the emission of waves of energy into the body, the BreakingPoint Storm CTM™ radiates extreme applications and malicious traffic into network components such as routers, switches, firewalls, and servers and displays the effects over time. Based on network processor technology, the BreakingPoint Storm CTM provides unprecedented insight by producing these real-world conditions: A custom blend of stateful application and malicious traffic at 40 Gigabits per second An always-current real-world mix of applications and attacks Unprecedented scalability, producing Internet-scale scenarios and traffic from millions of users The BreakingPoint Storm CTM provides this granular real-world simulation and is the only product capable of measuring the resiliency of switches, routers, firewalls, IPS devices, servers, networks, and data centers. By measuring the resiliency—performance, security, and stability—of discrete network components and data centers under high-stress, hostile conditions, BreakingPoint enables you to harden the resiliency of your critical IT infrastructures. Stay Current with Comprehensive Applications, Attacks, Service, and Support BreakingPoint also provides the BreakingPoint Application and Threat Intelligence (ATI)™ Program, an all-in-one service backed by a team of security experts, to complement the BreakingPoint Storm CTM. This program keeps BreakingPoint products updated with the latest security attacks and applications, as well as new features and performance upgrades. Exclusive BreakingPoint Capabilities Enterprises, government agencies and contractors, service providers, and network equipment manufacturers at the forefront of the war on cyber crime rely on BreakingPoint products to: Harden network infrastructures by assaulting them with a custom, global, and current blend of stateful applications, live security attacks, and high stress load to probe every weakness and vulnerability Optimize data center resiliency by simulating the behavior of millions of users, a crush of real-world applications, and security attacks—all without deploying racks of high-speed servers and costly software Evaluate and select the most appropriate network equipment for critical infrastructure with standardized, repeatable, and deterministic product assessments Measure and harden the resiliency of routers, switches, firewalls, IPS and UTM devices, and other equipment by subjecting them to real-world conditions prior to deployment and after patches or configuration changes Validate lawful intercept and data loss prevention systems with multilingual “needle in a haystack” simulation Identify and remediate problem areas that require tuning and configuration changes Audit and maintain standards compliance throughout the life cycle of network devices Conduct research and train security experts with BreakingPoint’s cyber range in a box, which re-creates Internet- scale network conditions and cyber threats Analyze the impact of traffic on network devices and systems to conduct research and train the next generation of security experts Harden Your Network Against Cyber Attacks The BreakingPoint Storm CTM™ is the world’s first device to pinpoint previously impossible-to-detect stress fractures in your network, network devices, or data center before they are exploited

Upload: breakingpoint

Post on 06-Mar-2015

62 views

Category:

Documents


1 download

DESCRIPTION

The BreakingPoint Storm CTM provides granular real-world simulation and is the only product capable of measuring the resiliency of switches, routers, firewalls, IPS devices, servers, networks, and data centers. By measuring the resiliency—performance, security, and stability—of discrete network components and data centers under high-stress, hostile conditions, BreakingPoint enables you to harden the resiliency of your critical IT infrastructures.

TRANSCRIPT

Page 1: BreakingPoint Storm CTM Data Sheet

BreakingPoint Storm CTM™ At A Glance

BreakingPoint introduced the world’s first Cyber Tomography Machine (CTM), designed for the world in which we live—a perilously interconnected universe with escalating network traffic and cyber attacks from a growing list of enemies. It is the only product that allows you to pinpoint previously impossible-to-detect weaknesses and vulnerabilities in networks, network devices, and data centers before they are exploited to wreak havoc within critical network infrastructures.

BreakingPoint Provides a Virtual CT Scan for Your NetworkMuch as a medical computed tomography or CT scan requires the injection of dyes and the emission of waves of energy into the body, the BreakingPoint Storm CTM™ radiates extreme applications and malicious traffic into network components such as routers, switches, firewalls, and servers and displays the effects over time. Based on network processor technology, the BreakingPoint Storm CTM provides unprecedented insight by producing these real-world conditions: • A custom blend of stateful application and malicious traffic at

40 Gigabits per second

• An always-current real-world mix of applications and attacks

• Unprecedented scalability, producing Internet-scale scenarios and traffic from millions of users

The BreakingPoint Storm CTM provides this granular real-world simulation and is the only product capable of measuring the resiliency of switches, routers, firewalls, IPS devices, servers, networks, and data centers. By measuring the resiliency—performance, security, and stability—of discrete network components and data centers under high-stress, hostile conditions, BreakingPoint enables you to harden the resiliency of your critical IT infrastructures.

Stay Current with Comprehensive Applications, Attacks, Service, and SupportBreakingPoint also provides the BreakingPoint Application and Threat Intelligence (ATI)™ Program, an all-in-one service backed by a team of security experts, to complement the BreakingPoint Storm CTM. This program keeps BreakingPoint products updated with the latest security attacks and applications, as well as new features and performance upgrades.

Exclusive BreakingPoint CapabilitiesEnterprises, government agencies and contractors, service providers, and network equipment manufacturers at the forefront of the war on cyber crime rely on BreakingPoint products to:• Harden network infrastructures by assaulting them with a

custom, global, and current blend of stateful applications, live security attacks, and high stress load to probe every weakness and vulnerability

• Optimize data center resiliency by simulating the behavior of millions of users, a crush of real-world applications, and security attacks—all without deploying racks of high-speed servers and costly software

• Evaluate and select the most appropriate network equipment for critical infrastructure with standardized, repeatable, and deterministic product assessments

• Measure and harden the resiliency of routers, switches, firewalls, IPS and UTM devices, and other equipment by subjecting them to real-world conditions prior to deployment and after patches or configuration changes

• Validate lawful intercept and data loss prevention systems with multilingual “needle in a haystack” simulation

• Identify and remediate problem areas that require tuning and configuration changes

• Audit and maintain standards compliance throughout the life cycle of network devices

• Conduct research and train security experts with BreakingPoint’s cyber range in a box, which re-creates Internet-scale network conditions and cyber threats

• Analyze the impact of traffic on network devices and systems to conduct research and train the next generation of security experts

Harden Your Network Against Cyber AttacksThe BreakingPoint Storm CTM™ is the world’s first device to pinpoint previously impossible-to-detect stress fractures in your network, network devices, or data center before they are exploited

Page 2: BreakingPoint Storm CTM Data Sheet

BreakingPoint Storm CTM™At A Glance

www.breakingpoint.com© 2005 – 2011. BreakingPoint Systems, Inc. All rights reserved. The BreakingPoint logo is a trademark of BreakingPoint Systems, Inc.All other trademarks are the property of their respective owners.

BreakingPoint Storm CTM FeaturesStress Networks, Data Centers, and Devices with Real-World Conditions to Pinpoint Stress FracturesBreakingPoint produces blended applications and the most current security attacks at global-scale performance levels while emulating millions of users. • Ships with more than 150 application protocols out of the box,

including popular applications such as AOL® IM, BlackBerry® Services, Google® Gmail, FIX, Gnutella, IBM® DB2®, VMware® VMotion™, HTTP, Microsoft® CIFS/SMB, MAPI, Oracle®, Encrypted BitTorrent™, eDonkey, MSN® Nexus, RADIUS, SIP, Skype™, Windows Live Messenger, World of Warcraft®, Yahoo!® Mail, Yahoo! Messenger, and many others

• Provides an optional Custom Application Toolkit and Custom Strike Toolkit to create and accelerate custom applications and security attacks

• Provides 4,500+ live security attacks out of the box, with new attacks made available weekly, and the industry’s only full coverage for Microsoft security updates within 24 hours of announcement

• Enables sophisticated attack simulation with more than 100 evasions, botnet-driven distributed denial of service (DDoS) attacks, and more

• Simulates millions of users and blended application traffi c at live network speeds of up to 40 Gigabits per second from a single three-slot chassis

• Scales to unlimited performance levels with multiple chassis managed via a single interface and confi guration, with integrated reporting

Score Network, Data Center, and Device Resiliency with Standardized Scientifi c MeasurementsThe BreakingPoint Storm CTM produces the BreakingPoint Resiliency Score™, a deterministic, scientifi c, and repeatable measurement of network resiliency.• Features the BreakingPoint Resiliency Score Lab, a wizard-

like interface for standardizing measurement of devices and networks with virtually no confi guration eff ort

• Enables customers to maintain ongoing resiliency by scoring and remediating issues as resiliency trends lower over time

Lower Total Cost of Ownership The BreakingPoint Storm CTM is architected to adapt rapidly to change and ensure ongoing resiliency with the latest applications, security attacks, product features, and performance upgrades.• All-inclusive pricing includes access to all applications and

security attacks required for real-world simulations

• Backed by a dedicated group of security researchers and application protocol engineers committed to keeping the product completely current with frequent strike and protocol updates

• Easy to use by staff at all skill levels, from IT and security researchers to experts and technical marketing professionals

• Automated point-and-click capabilities and a library of prebuilt profi les reduce confi guration time

• Scales easily to replace costly server farms or cyber range operations with a small, easy-to-maintain product

About BreakingPoint SystemsBreakingPoint cybersecurity products are the standard by which the world’s governments, enterprises, and service providers optimize and harden the resiliency of their cyber infrastructures. Learn more about BreakingPoint products and services by contacting a representative in your area.1.866.352.6691 U.S. Toll Freewww.breakingpoint.com

The BreakingPoint Storm CTM emits high-speed application, attack, and malformed traffi c and a crush of user load, returning a deep analysis of the effects of the traffi c on network devices, networks, and data centers.