0 Bewertungen0% fanden dieses Dokument nützlich (0 Abstimmungen)
30 Ansichten8 Seiten
The Ixia BreakingPoint Storm(tm) is a Cyber Tomography Machine designed for the world in which we live. It pinpoints previously impossible-to-detect weaknesses and vulnerabilities in network components such as routers, switches, firewalls, servers and data centers. Only The BreakingPoint Storm can provide this unprecedented insight by producing these real-world conditions.
The Ixia BreakingPoint Storm(tm) is a Cyber Tomography Machine designed for the world in which we live. It pinpoints previously impossible-to-detect weaknesses and vulnerabilities in network components such as routers, switches, firewalls, servers and data centers. Only The BreakingPoint Storm can provide this unprecedented insight by producing these real-world conditions.
The Ixia BreakingPoint Storm(tm) is a Cyber Tomography Machine designed for the world in which we live. It pinpoints previously impossible-to-detect weaknesses and vulnerabilities in network components such as routers, switches, firewalls, servers and data centers. Only The BreakingPoint Storm can provide this unprecedented insight by producing these real-world conditions.
Attack and High-Stress Application Trafc? The Ixia BreakingPoint Storm nds previously impossible-to-detect stress fractures in your network, network devices, or data center before they are exploited The BreakingPoint Storm is a Cyber Tomography Machine designed for the world in which we livea perilously interconnected universe with escalating network trafc and cyber attacks from a growing list of enemies. It is the only product that allows you to pinpoint previously impossible-to-detect weaknesses and vulnerabilities in network components such as routers, switches, rewalls, servers and data centers before they can be exploited to wreak havoc within your critical network infrastructure. Based on a breakthrough in network processor technology and a future-proof product architecture, only BreakingPoint Storm can provide this unprecedented insight by producing these real-world conditions: A custom blend of stateful application and malicious trafc for your network at 40GB per second An always current real-world mix of applications and attacks Unprecedented scalability producing true global network scenarios and trafc from millions of users With the ability to simulate real-world conditions at those performance levels, only the BreakingPoint Storm can truly measure the resiliency and accuracy of products that rely on deep packet inspection (DPI) technologynetwork devices, lawful intercept systems, data loss prevention solutions and more. By measuring the resiliencyperformance, security and stabilityof discrete network components under high-stress, hostile conditions, BreakingPoint enables you to nd the hidden stress fractures lurking within your critical network. Comprehensive Applications, Attacks, Service and Support BreakingPoint also offers the BreakingPoint Application and Threat Intelligence (ATI) Program, an all-in-one service backed by a team of security experts. This program keeps your BreakingPoint Storm updated with the latest security attacks and applications, as well as new product features and performance upgrades as they are released. BreakingPoint Storm measures how your network or data center will weather cyber attack or the stress of high-volume trafc with a solution that is: Enterprises, government agencies and contractors, service providers and network equipment manufacturers at the forefront of the war on cybercrime rely on BreakingPoint products and expertise to: Harden Network Infrastructures: Assault network infrastructures with a custom, global and current blend of stateful applications, live security attacks and extreme high-stress load to measure resiliency. Gain visibility into never-before-seen areas of your network, probing every weakness and vulnerability to pinpoint hidden stress fractures. Optimize Data Center Resiliency: Simulate the behavior of millions of users, a crush of real-world application trafc and live security attacks to ensure that data centers will be resilient under hostile conditionsall without the need to deploy racks of high-speed servers and costly software. Evaluate Network Equipment: Evaluate and select the most appropriate network equipment for your infrastructure with standardized, repeatable and deterministic product assessments. Measure and harden the resiliency of routers, switches, rewalls, IPS, UTM and other devices by subjecting them to real-world conditions prior to deployment and after patches or conguration changes. Maintain Resiliency and Compliance: Identify network devices or systems that would benet from tuning and conguration changes. Audit and maintain standards compliance throughout the life cycle of network devices and systems. Research and Train Security Experts: Re-create global-scale network conditions and the ever-changing threat landscape. Analyze the impact of trafc on network devices and systems to conduct research and train the next generation of security experts. Learn More Inside >> Ixia BreakingPoint Storm Comprehensive: Simulates Real-World Scenarios The BreakingPoint Storm provides comprehensive simulations for any situation: Network Proles Use precongured trafc proles to represent a range of network scenarioswireless, global service provider, enterprise, government and others Application Simulator Measure the ability of a network device to accurately process a variety of application layer trafc ows Client Simulator Measure the ability of a server or server farm to efciently handle extreme trafc volume by simulating the behavior of millions of concurrent users Security Subject a device to thousands of unique security attacks to validate blocking capabilities or conrm the stability of devices Session Sender Measure the ability of a device to handle concurrent TCP sessions by creating and maintaining large numbers of valid TCP sessions with contrived data Stack Scrambler Measure the ability of a device to operate in the face of invalid IP, UDP and TCP packets produced by fuzzing Re-create Capture and re-create trafc ows that are independent of network topology Routing Robot Measure the ability of a device to correctly route IP packets by producing IP packets with a UDP payload Realistic and Adaptive: More Than 34K+ Security Attacks and 180 Applications With Frequent Updates The BreakingPoint Storm adapts to the ever-changing cyber landscape with the latest real-world applications and live security attacks. Live Security Attacks With security in our DNA, BreakingPoint provides an extensive and always current library of 34K+ realistic security attacks with updates published by our dedicated team of in-house security researchers. Using advanced security coprocessor technology, these attacks are randomized, obfuscated and undetectable by trivial pattern-matching intrusion prevention system (IPS) algorithms Microsoft Tuesday Updates Ensure that your network or device is fully covered with full Microsoft Tuesday coverage Real-World Applications Select and blend stateful application trafc from a library of more than 180 of the worlds most popular applications: AOL IM, Google Gmail, FIX, Gnutella, IBM DB2, VMware VMotion, HTTP, Microsoft CIFS/SMB, MAPI, Oracle, Encrypted BitTorrent, eDonkey, MSN Nexus, RADIUS, SIP, Skype, Windows Live Messenger, World of Warcraft, Yahoo! Mail, Yahoo! Messenger and many others Custom Toolkits Optional Custom Toolkits accelerate attacks and proprietary protocols BreakingPoint Storm Cybersecurity Advantages Real-World Application and Network Proles Precongured stateful application trafc proles for a range of networks: mobile, service provider, enterprise, government, higher education and others Blend of more than 180 global applications, such as AOL IM, Google Gmail, FIX, Gnutella, IBM DB2, VMware VMotion, HTTP, Microsoft CIFS/SMB, MAPI, Oracle, Encrypted BitTorrent, eDonkey, MSN Nexus, RADIUS, SIP, Skype, Windows Live Messenger, World of Warcraft, Yahoo! Mail, Yahoo! Messenger and many others No performance degradation with blended protocols Stateful re-creation of captured trafc, including an industry- leading 2 Gigabytes of capture buffer per port Optional Custom Application Toolkit for proprietary applications Live Security Attacks Searchable library of more than 34K+ live security attacks and frequent updates Comprehensive Microsoft Tuesday coverage More than 80 evasions to validate common security defenses Optional Custom Strike Toolkit for custom attacks All-in-One Application and Threat Intelligence The latest attacks and applications as well as new product features, upgrades, maintenance, service and support Backed by dedicated Application and Threat Intelligence team Deep Packet Inspection (DPI), Data Loss Prevention, Anomaly Detection and Lawful Intercept Validation DPI validation using needle-in-a-haystack scenarios Ability to embed anomalous trafc patterns and multilingual keywords into tens of millions of data streams Easy to Use, Easily Scalable Intuitive object-oriented user interface for creating realistic simulations Wizard-like labs for accelerating conguration Ability to scale to unlimited performance levels Unprecedented Performance from a Single Chassis 40 Gbps of stateful application trafc 80,000+ SSL sessions per second from a single chassis 30 million concurrent TCP sessions 1.5 million TCP sessions per second 600,000 steady-state complete TCP sessions per second Comprehensive IPv6 Compliance Validation Most current and complete IPv4/IPv6 dual-stack Ixia BreakingPoint Storm Fast: Emits High-Stress Trafc Composed of Millions of Users, 40GB of Stateful Applications and 80,000 SSL Sessions per Second The BreakingPoint Storm emits a high-speed mix of hundreds of application protocols, thousands of security attacks and millions of users to measure the resiliency of your network infrastructure against attack and high-stress load. High-Speed Blended Application Trafc Assault network devices and networks with up to 40 Gigabits per second (Gbps) of stateful application trafc in a single chassis Network ProcessorBased Architecture Reach unprecedented throughput levels with the only solution architected for performance, realism and responsiveness using a patent-pending network processorbased platform. The native 64-bit architecture delivers unparalleled performance in a single 3-slot chassis: 40 Gbps of stateful application trafc 80,000+ SSL sessions per second from a single chassis 30 million concurrent TCP sessions 1.5 million TCP sessions per second 600,000 steady-state complete TCP sessions per second 1GE and 10GE Interfaces Mix or match your choice of an 8-port 1GE or 4-port 10GE interface card Scalable Scale to enormous performance levels with multiple chassis using a single user interface, one conguration and integrated reporting Easy to Use, Scale and Update: Provides Extensive Automation, Precongured Labs and Intuitive User Interface The BreakingPoint Storm makes it easy to reuse scenarios, parameters and application settings; run concurrent independent simulations; and even perform all features via the Tcl API. Create and modify complex evaluations and measurements without the need for time-consuming scripting and reduce conguration time to a matter of minutes. Simulation Labs Streamline conguration with a library of precongured simulations that combine all the elements needed for many common product assessments, including: BreakingPoint Resiliency Score RFC 2544 Validation Lab Mobile Network Optimization Session Sender Lab Device Control and Automation Connect directly to a network or data center device to gather performance and security measurements without the need for a separate switch Simulation Import/Export Enable multiple users to share and reuse scenarios for a range of devices with an easy-to-use bulk import/export functionality Real-Time Statistics Immediately visualize measurement data during the evaluation Extensive Reporting Generate comprehensive and congurable reports, in Web/PDF format or as raw data, that provide insight and analysis to staff at all levels. Automatically produce detailed reports to streamline remediation efforts ATI Program for Updates, Service and Support Automatically receive the latest attacks, applications and operating systems upgrades at no additional cost, as well as access to comprehensive service and support Network Neighborhood Unique within the industry, the BreakingPoint Storm advanced user interface separates application simulation components from a particular network topology, making it simple to scale and to recongure simulations around new requirements. This object-oriented user interface eliminates complexity and makes it easy to reuse parameters and application settings by layering them on top of easily recongured network topologies BreakingPoint Storm Application Manager Choose from more than 150 applications, and tailor each protocol and simulation to your exact needs. BreakingPoint Storm Intuitive User Interface Create and modify complex simulations with built-in automation, precongured labs and an intuitive user interface. BreakingPoint Storm Strike Database Search for the live security attacks you need; save them in a smart list and it will automatically update with the latest attacks that t your original search criteria. Ixia BreakingPoint Storm Multi-User Conduct up to 16 concurrent simulations for maximum productivity, and add multiple users with varying privileges Scalable Simulation Scale to enormous performance levels by linking multiple BreakingPoint Storm s using a single user interface, conguration and integrated reporting Tcl API Build your own sophisticated scenarios with our full-featured programmatic Tcl interface Repeatable, Deterministic and Scientic: Leverage Proven Methodologies, Repeatable Labs and Pseudo Random Number Generation The BreakingPoint Storm features prepackaged simulation labs for standardized and repeatable assessments. The product also supports pseudo random number generation (PRNG) to ensure that randomized components of a simulation can be repeated. The BreakingPoint Storm is also the only product to provide a Resiliency Score Lab, a repeatable, deterministic and scientic score of a devices performance, security and stability over time. Prepackaged and Repeatable Simulation Labs Leverage precongured simulation labs that require minimal modication to streamline setup and tedious conguration changes Pseudo Random Number Generation (PRNG) Produce random yet repeatable trafc simulations using a PRNG seed. PRNG ensures that even the randomized components of a simulation sequence may be repeated identically across multiple cycles BreakingPoint Resiliency Score Use the standardized Resiliency Score Lab for a deterministic, scientic and easy-to-use evaluation mechanism for the performance, security and stability of networking devices. With virtually no conguration effort, users can easily compare the resiliency of numerous networking devices or highlight scoring trends over time, holding their equipment vendors accountable for performance and security weaknesses The BreakingPoint Resiliency Score Certication for performance and security is nothing new. In fact, we have come to expect it for everything from our phones to our automobiles. Yet cyber infrastructure equipment, which supports our businesses and governments, has no standardized certication for performance and security. Instead we rely on statements made in product marketing literature, which are based on best-case scenarios, not real-world truths. Organizations want measurable answers, not assurances, when it comes to cybersecurity. The BreakingPoint Resiliency Score replaces marketing assurances with the measurable answers needed to harden cyber infrastructure against attack and peak application load. Using the BreakingPoint Resiliency Score, available within the BreakingPoint Storm, enterprises, service providers and government agencies can evaluate equipment using an objective, repeatable and scientically measured certication of the performance, security and stability of any network or network device. The BreakingPoint Resiliency Score is a highly automated, relevant and reproducible scoring mechanism that measures the resiliency of a network or network device under real-world application trafc, real-time security attacks, heavy user load and other methods. The BreakingPoint Resiliency Score lets you: Conduct standardized, deterministic and repeatable bake-offs to evaluate vendor performance and security claims Identify deployments that are inherently less resilient and establish risk models for managed security service engagements Institute and consistently analyze accurate liability models Create tiered pricing models that take into account liability and risk models Identify and remediate security and performance degradation over time to ensure ongoing resiliency Rightsize your infrastructure by evaluating resiliency based on deployment scenarios Make more informed network device and service purchase decisions The BreakingPoint Resiliency Score A standardized and highly automated means to measure and deterministically score the performance, security and stability of networking devices. Ixia BreakingPoint Storm All Inclusive: Stay Current With The Application and Threat Intelligence (ATI) Program BreakingPoint products are architected to adapt rapidly to change. That is the only way to ensure that networks will maintain ongoing resiliency against attack. BreakingPoint continuously introduces security strikes and applications from BreakingPoint Labs through our Application and Threat Intelligence (ATI) service and support program. The only research team of its kind, the BreakingPoint ATI team is a dedicated group of security researchers and application protocol engineers committed to keeping the BreakingPoint Storm completely current. The research team provides frequent strike and protocol updates and is on call to provide users with requested protocols, often in a matter of hours. The combination of the BreakingPoint Storm and up-to-date security strikes and protocols enables you to nd critical cyber infrastructure vulnerabilities before it is too late. Additional Options BreakingPoint Custom Application Toolkit: Write and accelerate your own proprietary applications BreakingPoint Custom Strike Toolkit: Develop and accelerate custom security attacks BreakingPoint Storm Technical Specications System Conguration 3-slot chassis with 1 system controller Up to 2 interface cards per chassis; options include: 10GE interface card 4 10GE ports XFP interface 2 Gigabytes of capture buffer per port 1GE interface card 8 1GE ports SFP interface 1 Gigabyte of capture buffer per port Physical Specications Rack Units: 4 Installed: 17.4 in. W x 7 in. H x 19.5 in. D (44.2 cm W x 17.8 cm H x 49.8 cm D) Shipping Weight: 45 lbs. (20.4 kg) Operating Environment: 15 C to 40 C Nonoperating Environment: -20 C to 70 C Power Requirements: 100-240V, 50/60 Hz Maximum Power Consumption: 1200W Regulatory Approvals: FCC Class A, CE, EN60950 BreakingPoint ATI Program Keep your simulations current with the very latest live security attacks, real-world applications and features automatically updated to your BreakingPoint Storm. The BreakingPoint Storm 3-slot chassis is available with a 10GE or 1GE interface card and can be seamlessly connected to additional chassis for unlimited performance scalability. Ixia BreakingPoint Storm Partial List of More Than 150 Real-World Applications In addition to more than 4,500 live security attacks, the BreakingPoint Storm supports a growing portfolio of more than 150 applications, with new applications and security attacks added frequently. Visit www.breakingpoint.com for the most up-to-date list. AUTHENTICATION DIAMETER RADIUS Accounting RADIUS Access CHAT | INSTANT MESSAGING AIM6 Keyserver AIM6 Rendezvous AIM6 Switchboard AOL Instant Messenger Google Talk ICQ IRC JABBER MSN Dispatch MSN Nexus MSN Notication MSN Passport MSN Switchboard OSCAR OSCAR File Transfer QQ IM QQ Live Windows Live Messenger Yahoo! Messenger CUSTOM APPLICATIONS BGP RAW DATA TRANSFER FTP Gopher HTTP NNTP RSync TFTP DATA TRANSFER / FILE SHARING IPP NetBIOS NetBIOS DGM NetBIOS NS NetBIOS SSN NFS RPC NFS SMB SMB/CIFS SMB v2 DATABASES IBM DB2 Informix Microsoft SQL MySQL Oracle PostgreSQL Sybase TDS TNS DISTRIBUTED COMPUTING Citrix DCE/RPC VMware VMotion ENTERPRISE APPLICATIONS DCE/RPC Endpoint Mapper DCE/RPC Exchange Directory DCE/RPC MAPI Exchange LPD MODBUS SAP EMAIL/WEBMAIL AOL Webmail Google Gmail GMX Webmail GMX Webmail Attachment MSN Hotmail MSN Hotmail Attachment IMAP IMAPv4 Advanced Outlook Web Access POP3 POP3 Advanced SMTP Yahoo! Mail Yahoo! Mail Attachment FINANCIAL FIX FIXT
GAMES World of Warcraft Xbox Live MOBILE HTTP Mobile BlackBerry Services BBC iPlayer Apple App Store Android Market PEER-TO-PEER Applejuice BitTorrent Peer BitTorrent Tracker BitTorrent eDonkey Gnutella Leaf Gnutella Ultrapeer PPLive/QQLive WinNY REMOTE ACCESS RDP REXEC RFB RLogin Telnet SECURE DATA TRANSFER HTTPS SSH SYSTEM/NETWORK ADMINISTRATOR DNS DNS (Deprecated) IDENT IPMI v1.5 Finger LDAP NTP RIP RPC Bind RPC Mount SNMP Sun RPC Syslog Time SOCIAL NETWORKING | MEDIA Facebook Twitter TELEPHONY SMPP MM1 H.225 H.225 RAS H.245 H.248 H.323 TR-069 TESTING AND MEASUREMENT Chargen Daytime Discard Echo OWAMP Control OWAMP Test QOTD TWAMP Control TWAMP Test VOICE / VIDEO BICC H.255.0 H.255 RAS H.245 H.248 MMS MM1 Netix Streaming RTCP RTP RTP Unidirectional Stream RTCP RTSP SCCP SIP Skype Skype UDP Helper STUN STUN v2 Ixia BreakingPoint Storm Notes: Ixia BreakingPoint Storm www.ixiacom.com/breakingpoint PN: 915-6711-01, Rev. A, September 2012. This material is for informational purposes only and subject to change without notice. It describes Ixias present plans to develop and make available to its customers certain products, features, and capabilities. Ixia is only obligated to provide those deliverables specically included in a written agreement between Ixia and the customer. About BreakingPoint BreakingPoint pioneered the rst and only solution to expose previously impossible-to-detect stress fractures within cyber infrastructure components before they are exploited to compromise customer data, corporate assets, brand reputation and even national security. BreakingPoint cybersecurity products are the standard by which the worlds governments, enterprises and service providers optimize the resiliency of their cyber infrastructures. For more information, visit www. breakingpoint.com. BreakingPoint Storm BreakingPoint has pioneered Cyber Tomography with the introduction of the BreakingPoint Storm, enabling users to see for the rst time the virtual stress fractures lurking within their cyber infrastructure through the simulation of crippling attacks, high-stress trafc load and millions of users. BreakingPoint Storm is a three-slot chassis that provides the equivalent performance and simulation of racks and racks of servers, including: 40 Gigabits per second of blended stateful application trafc 30 million concurrent TCP sessions 1.5 million TCP sessions per second 600,000+ complete TCP sessions per second 80,000+ SSL sessions per second 150+ stateful applications 4,500+ live security strikes BreakingPoint Resources Hardening cyber infrastructure is not easy work, but nothing that is this important has ever been easy. Enterprises, service providers, government agencies and equipment vendors are under pressure to establish a cyber infrastructure that can not only repel attack but that is alsow resilient to application sprawl and maximum load. BreakingPoints provides the technology and solutions that allow these organizations to create a hardened and resilient cyber infrastructure. BreakingPoint also provides the very latest industry resources to make this process that much easier, including resiliency methodologies, how- to guides, white papers, webcasts and a newsletter. To learn more, visit www.breakingpoint.com/resources. BreakingPoint Application and Threat Intelligence Community Join discussions on the latest developments in application and threat intelligence. BreakingPoint Labs brings together a diverse community of people leveraging the most current insight to harden cyber infrastructure to withstand crippling attack and high-stress application load. Visit www.breakingpointlabs.com. Contact BreakingPoint Learn more about BreakingPoint products and services by contacting a representative in your area. 1.866.352.6691 U.S. Toll Free www.breakingpoint.com BreakingPoint Global Headquarters 3900 North Capital of Texas Highway Austin, TX 78746 email: salesinfo@breakingpoint.com tel: 512.821.6000 toll free: 866.352.6691 BreakingPoint Government Solutions Group Washington, D.C. email: government@breakingpoint.com tel: 703.443.1301 BreakingPoint EMEA Sales Ofce Paris, France email: emea_sales@breakingpoint.com tel: + 33 6 08 40 43 93 BreakingPoint APAC Sales Ofce Suite 2901, Building #5, Wanda Plaza No. 93 Jianguo Road Chaoyang District, Beijing, 100022, China email: apac_sales@breakingpoint.com tel: + 86 10 5960 3162