SlideShare ist ein Scribd-Unternehmen logo
1 von 2
Downloaden Sie, um offline zu lesen
BreakingPoint Storm CTM™:
                                                                                           The Alternative to Costly and Complex Cyber Ranges




The BreakingPoint Storm CTM™: The Alternative to
Costly and Complex Cyber Ranges
Unleash Internet-scale cyber war in a controlled environment to measure the resiliency of network and data
center infrastructures, advance research and development, and train cyber warriors


Cyber ranges are critical tools for hardening the resiliency—security,   attack. With its innovative, future-proof approach to delivering the
stability, and performance—of vital government, military, and            capabilities of a traditional cyber range from a 3-slot chassis, a single
intelligence cyber infrastructures. Yet cyber ranges require massive     BreakingPoint Storm CTM emulates a complete global network with:
amounts of disparate equipment from multiple vendors, large                 •	 A blend of stateful application and malicious traffic at 40
numbers of skilled personnel, and long development and testing                 Gigabits per second
cycles. In the past, only this resource-intensive approach could           •	 An always-current mix of traffic from hundreds of real-world
generate the real-world conditions needed to harden defenses                  application protocols and thousands of attacks
against the full spectrum of cyber threats.                                •	 The ability to create and accelerate custom applications and
                                                                              attacks
Building and maintaining a cyber range by throwing hardware                •	 More than 30 million concurrent TCP sessions to emulate
and personnel at the problem is a costly and wasteful exercise. This          millions of users
inefficiency does not make sense in an era of flattened defense            •	 Comprehensive security coverage including attacks, fuzzing,
budgets and scarce human resources. More importantly, this                    malware, obfuscations, and evasions
approach simply cannot scale to address traffic volume and attacks         •	 Built-in traffic profiles and use-case methodologies to
that are multiplying in both quantity and complexity. These realities         accelerate productivity
mandate a new model for the modern cyber range—a “leap-ahead”
technological approach that unleashes Internet-scale cyber war           Exclusive Capabilities
from a single comprehensive, easy-to-maintain device.                    Attack, measure, and harden the resiliency of network and data
                                                                         center infrastructures with unprecedented performance and
The BreakingPoint Storm CTM: Complete Cyber Range                        realism.
Functionality and Massive Scale in a Small Footprint                       •	 Only the BreakingPoint Storm CTM can emulate your own
The BreakingPoint Cyber Tomography Machine (CTM) answers this                 large-scale network conditions with the performance, stateful
challenge because it embodies the power and scope of a cyber                  applications, and current attacks needed to fully validate the
range, but without requiring multi-million-dollar expenditures                deep packet inspection (DPI) technologies prevalent in today’s
and teams of engineers to set up and maintain. The patented                   networks and data centers.
BreakingPoint Storm CTM is used by government and military                 •	 The product includes more than 150 application protocols,
organizations, as well as leading defense contractors, global                 including AOL® IM, Yahoo!® Mail and Messenger, Google® Gmail,
enterprises, and service providers, to harden networks and data               Skype®, BitTorrent™, eDonkey, RADIUS, SIP, mobile network,
centers to be resilient in the face of escalating application load and        social network, and gaming protocols. It also provides more
                                                                              than 4,500 attacks and is backed by an Application and Threat
                                                                              Intelligence research team dedicated to keeping applications
                                                                              and attacks current, delivering Microsoft Tuesday coverage, and
                                                                              providing frequent feature and performance enhancements.
                                                                           •	 The integrated BreakingPoint Resiliency Score™ provides
                                                                              standardized and repeatable measurements of the security,
                                                                              stability, and performance of every component of networks
                                                                              and data centers. Developed using standards by organizations
                                                                              such as US–CERT, IEEE, and the IETF, as well as insight into traffic
                                                                              from the world’s largest service providers, it provides advance
                                                                              insight into how your product or environment will be impacted
BreakingPoint Storm CTM™:
                                                                                                                       The Alternative to Costly and Complex Cyber Ranges


     by changes such as peak user load, network reconfiguration,                                      simulated Distributed Denial of Service (DDoS) and botnet
     and new security attacks.                                                                        attacks, and leverage the BreakingPoint Custom Toolkits to
  •	 The BreakingPoint Storm CTM subjects massive virtualized                                         develop and accelerate your own applications and attacks.
     infrastructures to peak user load and attack to evaluate and                                 •	 Emulate, attack, and evaluate network operations and security
     optimize the resiliency of cloud services.                                                      defenses at any level of detail using one of the industry’s largest
  •	 It also includes an easy-to-use automated lab for validating                                    packet capture buffers.
     Lawful Intercept and Data Loss Prevention solutions using a
                                                                                               BreakingPoint Storm CTM Specifications
     digital storm of content from evergreen application protocols
                                                                                               Based on a patented breakthrough in network processor
     and communications in multiple languages.
                                                                                               architecture and backed by a team of network performance and
Conduct advanced and repeatable research and development                                       security experts, only the BreakingPoint Storm CTM produces
experiments with this automated and configurable solution.                                     Internet-scale cyber war conditions in a comprehensive, easy-to-use,
  •	 The BreakingPoint Storm CTM accurately simulates the real-                                and low-maintenance product. This 3-slot chassis device provides
     world scale and complexities of cyber warfare with prebuilt                               the equivalent performance and capabilities of hundreds of racks of
     traffic profiles, real applications and attacks, and the behavior                         high performance servers, including:
     of millions of users to evaluate and accelerate advances in                                  •	 40 Gigabits per second of blended stateful application traffic
     offensive and defensive technologies.                                                        •	 30 million concurrent TCP sessions
  •	 Multiple BreakingPoint Storm CTMs can also be combined                                       •	 1.5 million TCP sessions per second
     using a single interface and a single configuration for even
                                                                                                  •	 80,000+ SSL sessions per second
     greater performance; previous deployments have emulated up
                                                                                                  •	 600,000+ complete TCP sessions per second
     to 300,000,000 Internet users at once.
                                                                                                  •	 150+ stateful application protocols
  •	 The product creates a barrage of unstructured data in multiple
     languages, allowing users to conduct experiments in data                                     •	 4,500+ live security attacks
     detection, intercept, and analysis.                                                       To find out more about what BreakingPoint can do for your
  •	 BreakingPoint also provides a BreakingPoint Custom                                        organization, contact the BreakingPoint Government Solutions
     Application Toolkit and Custom Attack Toolkit to accelerate the                           Group at government@breakingpoint.com, 703.443.1501 or visit
     delivery of custom attacks and proprietary applications, and                              www.breakingpoint.com/demo to schedule an evaluation.
     analyze the results.
  •	 With BreakingPoint’s Psuedo Random Number Generation
     (PRNG) capabilities, users can produce random yet repeatable
     simulations using a PRNG seed to accelerate troubleshooting or
     analyze the effects.
  •	 Automated reporting provides rapid analysis and presentation of
     massive amounts of data to determine exactly what happened
     in each simulation, down to the level of each user simulated.

Evaluate and train cyber warriors by creating sophisticated,
distributed, and current cyber war exercises.
  •	 Just as a physical training ground allows soldiers to
     demonstrate and improve their combat skills, the
     BreakingPoint Storm CTM provides combatant commanders
     a digital environment in which to train, evaluate, and develop
     defensive and offensive capabilities.
  •	 Carry out sophisticated red team / blue team exercises, assess
     information assurance capabilities, measure the quality of incident
     response procedures, and more by simulating real attacks.
  •	 Conduct realistic opposing force (OPFOR) exercises, including



www.breakingpoint.com
© 2005 - 2011. BreakingPoint Systems, Inc. All rights reserved. The BreakingPoint logo is a trademark of BreakingPoint Systems, Inc.
All other trademarks are the property of their respective owners.

Weitere ähnliche Inhalte

Mehr von Ixia

IPS Test Methodology
IPS Test MethodologyIPS Test Methodology
IPS Test MethodologyIxia
 
Deep Packet Inspection (DPI) Test Methodology
Deep Packet Inspection (DPI) Test MethodologyDeep Packet Inspection (DPI) Test Methodology
Deep Packet Inspection (DPI) Test MethodologyIxia
 
Load Test Methodology: Server Load Testing
Load Test Methodology: Server Load TestingLoad Test Methodology: Server Load Testing
Load Test Methodology: Server Load TestingIxia
 
IPv6 Test Methodology
IPv6 Test MethodologyIPv6 Test Methodology
IPv6 Test MethodologyIxia
 
Server Load Balancer Test Methodology
Server Load Balancer Test MethodologyServer Load Balancer Test Methodology
Server Load Balancer Test MethodologyIxia
 
How to Test High-Performance Next-Generation Firewalls
How to Test High-Performance Next-Generation FirewallsHow to Test High-Performance Next-Generation Firewalls
How to Test High-Performance Next-Generation FirewallsIxia
 
Catalyst 6500 ASA Service Module
Catalyst 6500 ASA Service ModuleCatalyst 6500 ASA Service Module
Catalyst 6500 ASA Service ModuleIxia
 
Testing High Performance Firewalls
Testing High Performance FirewallsTesting High Performance Firewalls
Testing High Performance FirewallsIxia
 
BreakingPoint & Fortinet RSA Conference 2011 Presentation: Evaluating Enterpr...
BreakingPoint & Fortinet RSA Conference 2011 Presentation: Evaluating Enterpr...BreakingPoint & Fortinet RSA Conference 2011 Presentation: Evaluating Enterpr...
BreakingPoint & Fortinet RSA Conference 2011 Presentation: Evaluating Enterpr...Ixia
 
BreakingPoint & Juniper RSA Conference 2011 Presentation: Securing the High P...
BreakingPoint & Juniper RSA Conference 2011 Presentation: Securing the High P...BreakingPoint & Juniper RSA Conference 2011 Presentation: Securing the High P...
BreakingPoint & Juniper RSA Conference 2011 Presentation: Securing the High P...Ixia
 
BreakingPoint & Stonesoft RSA Conference 2011 Presentation: Evaluating IPS
BreakingPoint & Stonesoft RSA Conference 2011 Presentation: Evaluating IPSBreakingPoint & Stonesoft RSA Conference 2011 Presentation: Evaluating IPS
BreakingPoint & Stonesoft RSA Conference 2011 Presentation: Evaluating IPSIxia
 
BreakingPoint & Juniper RSA Conference 2011 Presentation: Evaluating The Juni...
BreakingPoint & Juniper RSA Conference 2011 Presentation: Evaluating The Juni...BreakingPoint & Juniper RSA Conference 2011 Presentation: Evaluating The Juni...
BreakingPoint & Juniper RSA Conference 2011 Presentation: Evaluating The Juni...Ixia
 
BreakingPoint & Crossbeam RSA Conference 2011 Presentation: Evaluating High P...
BreakingPoint & Crossbeam RSA Conference 2011 Presentation: Evaluating High P...BreakingPoint & Crossbeam RSA Conference 2011 Presentation: Evaluating High P...
BreakingPoint & Crossbeam RSA Conference 2011 Presentation: Evaluating High P...Ixia
 
BreakingPoint & McAfee RSA Conference 2011 Presentation: Data Sheets Lie
BreakingPoint & McAfee RSA Conference 2011 Presentation: Data Sheets LieBreakingPoint & McAfee RSA Conference 2011 Presentation: Data Sheets Lie
BreakingPoint & McAfee RSA Conference 2011 Presentation: Data Sheets LieIxia
 
Cybersecurity: Arm and Train US Warriors to Win Cyber War
Cybersecurity: Arm and Train US Warriors to Win Cyber WarCybersecurity: Arm and Train US Warriors to Win Cyber War
Cybersecurity: Arm and Train US Warriors to Win Cyber WarIxia
 
Firewall Testing Methodology
Firewall Testing MethodologyFirewall Testing Methodology
Firewall Testing MethodologyIxia
 
BreakingPoint Cloud and Virtualization Data Sheet
BreakingPoint Cloud and Virtualization Data SheetBreakingPoint Cloud and Virtualization Data Sheet
BreakingPoint Cloud and Virtualization Data SheetIxia
 
Measure Network Performance, Security and Stability
Measure Network Performance, Security and StabilityMeasure Network Performance, Security and Stability
Measure Network Performance, Security and StabilityIxia
 
Breakingpoint Application Threat and Intelligence (ATI) Program
Breakingpoint Application Threat and Intelligence (ATI) ProgramBreakingpoint Application Threat and Intelligence (ATI) Program
Breakingpoint Application Threat and Intelligence (ATI) ProgramIxia
 
BreakingPoint Custom Application Toolkit
BreakingPoint Custom Application ToolkitBreakingPoint Custom Application Toolkit
BreakingPoint Custom Application ToolkitIxia
 

Mehr von Ixia (20)

IPS Test Methodology
IPS Test MethodologyIPS Test Methodology
IPS Test Methodology
 
Deep Packet Inspection (DPI) Test Methodology
Deep Packet Inspection (DPI) Test MethodologyDeep Packet Inspection (DPI) Test Methodology
Deep Packet Inspection (DPI) Test Methodology
 
Load Test Methodology: Server Load Testing
Load Test Methodology: Server Load TestingLoad Test Methodology: Server Load Testing
Load Test Methodology: Server Load Testing
 
IPv6 Test Methodology
IPv6 Test MethodologyIPv6 Test Methodology
IPv6 Test Methodology
 
Server Load Balancer Test Methodology
Server Load Balancer Test MethodologyServer Load Balancer Test Methodology
Server Load Balancer Test Methodology
 
How to Test High-Performance Next-Generation Firewalls
How to Test High-Performance Next-Generation FirewallsHow to Test High-Performance Next-Generation Firewalls
How to Test High-Performance Next-Generation Firewalls
 
Catalyst 6500 ASA Service Module
Catalyst 6500 ASA Service ModuleCatalyst 6500 ASA Service Module
Catalyst 6500 ASA Service Module
 
Testing High Performance Firewalls
Testing High Performance FirewallsTesting High Performance Firewalls
Testing High Performance Firewalls
 
BreakingPoint & Fortinet RSA Conference 2011 Presentation: Evaluating Enterpr...
BreakingPoint & Fortinet RSA Conference 2011 Presentation: Evaluating Enterpr...BreakingPoint & Fortinet RSA Conference 2011 Presentation: Evaluating Enterpr...
BreakingPoint & Fortinet RSA Conference 2011 Presentation: Evaluating Enterpr...
 
BreakingPoint & Juniper RSA Conference 2011 Presentation: Securing the High P...
BreakingPoint & Juniper RSA Conference 2011 Presentation: Securing the High P...BreakingPoint & Juniper RSA Conference 2011 Presentation: Securing the High P...
BreakingPoint & Juniper RSA Conference 2011 Presentation: Securing the High P...
 
BreakingPoint & Stonesoft RSA Conference 2011 Presentation: Evaluating IPS
BreakingPoint & Stonesoft RSA Conference 2011 Presentation: Evaluating IPSBreakingPoint & Stonesoft RSA Conference 2011 Presentation: Evaluating IPS
BreakingPoint & Stonesoft RSA Conference 2011 Presentation: Evaluating IPS
 
BreakingPoint & Juniper RSA Conference 2011 Presentation: Evaluating The Juni...
BreakingPoint & Juniper RSA Conference 2011 Presentation: Evaluating The Juni...BreakingPoint & Juniper RSA Conference 2011 Presentation: Evaluating The Juni...
BreakingPoint & Juniper RSA Conference 2011 Presentation: Evaluating The Juni...
 
BreakingPoint & Crossbeam RSA Conference 2011 Presentation: Evaluating High P...
BreakingPoint & Crossbeam RSA Conference 2011 Presentation: Evaluating High P...BreakingPoint & Crossbeam RSA Conference 2011 Presentation: Evaluating High P...
BreakingPoint & Crossbeam RSA Conference 2011 Presentation: Evaluating High P...
 
BreakingPoint & McAfee RSA Conference 2011 Presentation: Data Sheets Lie
BreakingPoint & McAfee RSA Conference 2011 Presentation: Data Sheets LieBreakingPoint & McAfee RSA Conference 2011 Presentation: Data Sheets Lie
BreakingPoint & McAfee RSA Conference 2011 Presentation: Data Sheets Lie
 
Cybersecurity: Arm and Train US Warriors to Win Cyber War
Cybersecurity: Arm and Train US Warriors to Win Cyber WarCybersecurity: Arm and Train US Warriors to Win Cyber War
Cybersecurity: Arm and Train US Warriors to Win Cyber War
 
Firewall Testing Methodology
Firewall Testing MethodologyFirewall Testing Methodology
Firewall Testing Methodology
 
BreakingPoint Cloud and Virtualization Data Sheet
BreakingPoint Cloud and Virtualization Data SheetBreakingPoint Cloud and Virtualization Data Sheet
BreakingPoint Cloud and Virtualization Data Sheet
 
Measure Network Performance, Security and Stability
Measure Network Performance, Security and StabilityMeasure Network Performance, Security and Stability
Measure Network Performance, Security and Stability
 
Breakingpoint Application Threat and Intelligence (ATI) Program
Breakingpoint Application Threat and Intelligence (ATI) ProgramBreakingpoint Application Threat and Intelligence (ATI) Program
Breakingpoint Application Threat and Intelligence (ATI) Program
 
BreakingPoint Custom Application Toolkit
BreakingPoint Custom Application ToolkitBreakingPoint Custom Application Toolkit
BreakingPoint Custom Application Toolkit
 

Kürzlich hochgeladen

Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfThe Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfSeasiaInfotech2
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 

Kürzlich hochgeladen (20)

Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfThe Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdf
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 

BreakingPoint Storm CTM - The Alternative to Costly and Complex Cyber Range Data Sheet

  • 1. BreakingPoint Storm CTM™: The Alternative to Costly and Complex Cyber Ranges The BreakingPoint Storm CTM™: The Alternative to Costly and Complex Cyber Ranges Unleash Internet-scale cyber war in a controlled environment to measure the resiliency of network and data center infrastructures, advance research and development, and train cyber warriors Cyber ranges are critical tools for hardening the resiliency—security, attack. With its innovative, future-proof approach to delivering the stability, and performance—of vital government, military, and capabilities of a traditional cyber range from a 3-slot chassis, a single intelligence cyber infrastructures. Yet cyber ranges require massive BreakingPoint Storm CTM emulates a complete global network with: amounts of disparate equipment from multiple vendors, large • A blend of stateful application and malicious traffic at 40 numbers of skilled personnel, and long development and testing Gigabits per second cycles. In the past, only this resource-intensive approach could • An always-current mix of traffic from hundreds of real-world generate the real-world conditions needed to harden defenses application protocols and thousands of attacks against the full spectrum of cyber threats. • The ability to create and accelerate custom applications and attacks Building and maintaining a cyber range by throwing hardware • More than 30 million concurrent TCP sessions to emulate and personnel at the problem is a costly and wasteful exercise. This millions of users inefficiency does not make sense in an era of flattened defense • Comprehensive security coverage including attacks, fuzzing, budgets and scarce human resources. More importantly, this malware, obfuscations, and evasions approach simply cannot scale to address traffic volume and attacks • Built-in traffic profiles and use-case methodologies to that are multiplying in both quantity and complexity. These realities accelerate productivity mandate a new model for the modern cyber range—a “leap-ahead” technological approach that unleashes Internet-scale cyber war Exclusive Capabilities from a single comprehensive, easy-to-maintain device. Attack, measure, and harden the resiliency of network and data center infrastructures with unprecedented performance and The BreakingPoint Storm CTM: Complete Cyber Range realism. Functionality and Massive Scale in a Small Footprint • Only the BreakingPoint Storm CTM can emulate your own The BreakingPoint Cyber Tomography Machine (CTM) answers this large-scale network conditions with the performance, stateful challenge because it embodies the power and scope of a cyber applications, and current attacks needed to fully validate the range, but without requiring multi-million-dollar expenditures deep packet inspection (DPI) technologies prevalent in today’s and teams of engineers to set up and maintain. The patented networks and data centers. BreakingPoint Storm CTM is used by government and military • The product includes more than 150 application protocols, organizations, as well as leading defense contractors, global including AOL® IM, Yahoo!® Mail and Messenger, Google® Gmail, enterprises, and service providers, to harden networks and data Skype®, BitTorrent™, eDonkey, RADIUS, SIP, mobile network, centers to be resilient in the face of escalating application load and social network, and gaming protocols. It also provides more than 4,500 attacks and is backed by an Application and Threat Intelligence research team dedicated to keeping applications and attacks current, delivering Microsoft Tuesday coverage, and providing frequent feature and performance enhancements. • The integrated BreakingPoint Resiliency Score™ provides standardized and repeatable measurements of the security, stability, and performance of every component of networks and data centers. Developed using standards by organizations such as US–CERT, IEEE, and the IETF, as well as insight into traffic from the world’s largest service providers, it provides advance insight into how your product or environment will be impacted
  • 2. BreakingPoint Storm CTM™: The Alternative to Costly and Complex Cyber Ranges by changes such as peak user load, network reconfiguration, simulated Distributed Denial of Service (DDoS) and botnet and new security attacks. attacks, and leverage the BreakingPoint Custom Toolkits to • The BreakingPoint Storm CTM subjects massive virtualized develop and accelerate your own applications and attacks. infrastructures to peak user load and attack to evaluate and • Emulate, attack, and evaluate network operations and security optimize the resiliency of cloud services. defenses at any level of detail using one of the industry’s largest • It also includes an easy-to-use automated lab for validating packet capture buffers. Lawful Intercept and Data Loss Prevention solutions using a BreakingPoint Storm CTM Specifications digital storm of content from evergreen application protocols Based on a patented breakthrough in network processor and communications in multiple languages. architecture and backed by a team of network performance and Conduct advanced and repeatable research and development security experts, only the BreakingPoint Storm CTM produces experiments with this automated and configurable solution. Internet-scale cyber war conditions in a comprehensive, easy-to-use, • The BreakingPoint Storm CTM accurately simulates the real- and low-maintenance product. This 3-slot chassis device provides world scale and complexities of cyber warfare with prebuilt the equivalent performance and capabilities of hundreds of racks of traffic profiles, real applications and attacks, and the behavior high performance servers, including: of millions of users to evaluate and accelerate advances in • 40 Gigabits per second of blended stateful application traffic offensive and defensive technologies. • 30 million concurrent TCP sessions • Multiple BreakingPoint Storm CTMs can also be combined • 1.5 million TCP sessions per second using a single interface and a single configuration for even • 80,000+ SSL sessions per second greater performance; previous deployments have emulated up • 600,000+ complete TCP sessions per second to 300,000,000 Internet users at once. • 150+ stateful application protocols • The product creates a barrage of unstructured data in multiple languages, allowing users to conduct experiments in data • 4,500+ live security attacks detection, intercept, and analysis. To find out more about what BreakingPoint can do for your • BreakingPoint also provides a BreakingPoint Custom organization, contact the BreakingPoint Government Solutions Application Toolkit and Custom Attack Toolkit to accelerate the Group at government@breakingpoint.com, 703.443.1501 or visit delivery of custom attacks and proprietary applications, and www.breakingpoint.com/demo to schedule an evaluation. analyze the results. • With BreakingPoint’s Psuedo Random Number Generation (PRNG) capabilities, users can produce random yet repeatable simulations using a PRNG seed to accelerate troubleshooting or analyze the effects. • Automated reporting provides rapid analysis and presentation of massive amounts of data to determine exactly what happened in each simulation, down to the level of each user simulated. Evaluate and train cyber warriors by creating sophisticated, distributed, and current cyber war exercises. • Just as a physical training ground allows soldiers to demonstrate and improve their combat skills, the BreakingPoint Storm CTM provides combatant commanders a digital environment in which to train, evaluate, and develop defensive and offensive capabilities. • Carry out sophisticated red team / blue team exercises, assess information assurance capabilities, measure the quality of incident response procedures, and more by simulating real attacks. • Conduct realistic opposing force (OPFOR) exercises, including www.breakingpoint.com © 2005 - 2011. BreakingPoint Systems, Inc. All rights reserved. The BreakingPoint logo is a trademark of BreakingPoint Systems, Inc. All other trademarks are the property of their respective owners.