Hardening Cyber Infrastructure to Be Resilient Under Hostile Conditions
BreakingPoint Systems, Inc.
• Founded September 2005• Cyber security leader • Cyber Tomography Machine™ pioneer• 280% year-over-year revenue growth
• Deep networking, security, performance assurance expertise
• Security and Application Research team
• Sales and Support operations:• US Headquarters: Austin, TX• North America• Europe• Asia Pacific
The Cyber Threat Pandemic
• Perilous interconnected world • Widespread vulnerabilities • Attacks escalating; morphing to evade detection• Trust has been broken
• Cyber security is hard• Complex and dynamic discipline• More ‘voodoo’ than science • Creating right conditions to measure the
resiliency of your environment is cost prohibitive
• Risks escalating• Theft of billions of dollars and vital intellectual
property• Escalating legal liabilities• Threats to national security
The Breakthrough: Cyber Tomography
Exposes previously impossible to
detect vulnerabilities within cyber
infrastructure components before
they are exploited to destroy what is
most important to you:
Customer data
Corporate assets
Brand reputation
National security
The BreakingPoint Storm CTM™
BreakingPoint Storm CTM
• 130+ applications • 4,500+ live security attacks• 80+ evasions• 40 Gbps blended application
traffic• 30M concurrent TCP sessions• 1.5M TCP sessions/second
BreakingPoint Storm CTM Specifications
• 3-slot chassis• 10GigE interface card
• Four 10GigE ports• XFP interface• 2 GB of capture buffer per port
• 1GigE interface card• Eight 1GigE ports• SFP interface• 1 GB of capture buffer per port
• Mix 10GigE and 1GigE ports
• Multi-user and field upgradable
• Real-time statistics and graphical reports
• 130+ applications; weekly updates
• 4,500+ live security attacks; weekly updates
• Custom applications and attacks
• 80+ evasions
• 40 Gbps of blended application traffic
• 30 million concurrent TCP sessions
• 1.5 million TCP sessions per second
• Scale to unlimited performance levels with one interface, single test configuration and integrated reporting
Application and Threat Intelligence
• All inclusive applications and attack updates • Real time traffic monitoring and flow analysis
• Updates downloaded to BreakingPoint product to measure effect on resiliency
• Published methodologies• Service, support, and comprehensive
maintenance
Breakthrough Capabilities
Harden Network Resiliency
Evaluate Devices and Applications
• Product evaluations: Standardized and repeatable resiliency measurement• Development: Validate next generation functionality• Deployment: Validate IPS, Firewall, UTM, and other
devices pre- and post-deployment
• DPI-based applications: Defense and intelligence systems validation • Lawful Intercept• Data Loss Prevention
Optimize Data Centers
• Create and analyze the effects of real global-scale conditions on your data center
• Simulate millions of users and multi-gigabit performance • Create a custom, current and global mix of applications and attacks• Scale to simulate massive load with one interface, integrated
reporting
Legacy Server Farm
BreakingPoint Storm CTM
Enterprise
Data Center
Server
Maintain Resiliency and Compliance
• Measure ongoing effects of changes and emerging threats on resiliency
• Ensure ongoing compliance with standards
Thank You
Questions & Answers
Partial List of More Than 130 Applications
ChatAIM6 KeyserverAIM6 RendezvousAIM6 SwitchboardAOL Instant MessengerIRCJabberMSN DispatchMSN NexusMSN NotificationMSN PassportMSN SwitchboardOSCAROSCAR File TransferQQ IMWindows Live MessengerYahoo! Messenger
AuthenticationDIAMETERRADIUS AccountingRADIUS Access
DatabasesIBM DB2InformixMicrosoft SQLMySQLOraclePostgreSQLSybaseTDSTNS
Data TransferFTPGopherHTTPNNTPRSyncTFTP
Data Transfer / File SharingIPPNetBIOSNETBIOS DGMNETBIOS NSNETBIOS SSNNFSRPC NFSSMBSMB/CIFSSMBv2
Email/WebmailAOL WebmailGmailGMX WebmailGMX Webmail AttachmentHotmailHotmail AttachmentIMAPIMAPv4 AdvancedOutlook Web AccessPOP3POP3 AdvancedSMTPYahoo! WebmailYahoo! Mail Attachment
FinancialFIXFIXT
GamesWorld of WarcraftXbox Live
Enterprise ApplicationsDCE/RPC Endpoint MapperDCE/RPC Exchange DirectoryDCE/RPC MAPI ExchangeSAP
Distributed ComputingCitrixDCE/RPCVMware VMotion
Partial List of More Than 130 Applications
Remote AccessRDPRFBRLogin
Telnet
Secure Data TransferHTTPSSSH
Voice/MediaH.225.0H.225 RASH.245MMS MM1RTCPRTPRTP Unidirectional StreamRTSPSIPSkypeSkype UDP HelperSTUN
TelephonySMPPMM1H.323
System/Network AdminDNSDNS (Deprecated)IDENTFingerLDAPNTPRPC BindRPC MountSNMPSNMPv1Sun RPCSyslogTime
Testing and MeasurementChargenDaytimeDiscardEchoOWAMP ControlOWAMP TestQOTDTWAMP ControlTWAMP Test
Social NetworkingTwitter
Peer-to-PeerAppleJuiceBitTorrent PeerBitTorrent TrackerBitTorrenteDonkeyGnutella LeafGnutella UltrapeerPPLive/QQLiveWinNY
MobileHTTP MobileBlackBerry ServicesBBC iPlayerApple App StoreAndroid Market
Recommended