PROPRIETARY AND CONFIDENTIAL
Is your Deep Packet Inspection testing ‘Deep’ enough?
Ankur Chadda
Product Marketing Manager
PROPRIETARY AND CONFIDENTIAL
The Application Explosion – it never ends!
PROPRIETARY AND CONFIDENTIAL
What are IT Departments Asking for…
PROPRIETARY AND CONFIDENTIAL
Understanding Malware
Short for Malicious Software Represents hostile software used to
• Disrupt computer operation
• Gather sensitive information
• Gain access to private computer systems
Common malware types:• Adware
• Keyloggers
• Ransomware
• Rootkits
• Spyware
• Trojan Horses
• Viruses
• Worms
Source: PandaLabs Annual Report for 2012 by Panda Security
MALWARE INFECTIONS BY TYPE IN 2012
PROPRIETARY AND CONFIDENTIAL
Malware Testing
• Test security counter measures and policies for detecting spreading malware
Infected host emulation
• Test inline or antivirus detection effectiveness
Binary transfer emulation
• Test the effectiveness and accuracy of your security devices and policies under real work load
Malware testing under application
load
PROPRIETARY AND CONFIDENTIAL
Summary
BYOD adds complexity with number of devices, endpoints and versions of apps on your network
Security infrastructure testing is no longer legacy firewall testing, but more involved with multiple vectors
Realistic emulation critical to understand actual impact
www.spirent.com
PROPRIETARY AND CONFIDENTIAL
To listen to the full webinar visit: http://www.spirent.com/OnDemand/Networks_and_Applications/DPI_Testing