Ixia BreakingPoint FireStorm | Deliver On


Ixia BreakingPoint FireStorm

Ixia BreakingPoint FireStorm

Massive-scale, easy-to-use and high-fidelity simulations to battle-test today's high-volume, dynamic, converged networks and data center infrastructures

The compact 3-slot Ixia BreakingPoint FireStorm creates real-world, high-stress conditions and user behavior to provide organizations the insight to battle-test IT infrastructures, train cyber warriors, tune systems and policies, and transform security processes to be proactive and effective.

Solution Brief

Data Sheets

White Paper

Videos

The Ixia BreakingPoint FireStorm is the essential solution for:

  • Evaluating next-generation security devices
  • Hardening 3G/4G/LTE mobile networks
  • Deploying compact cyber ranges and training cyber warriors
  • Optimizing virtualized data centers
  • Mitigating IT risk

The Ixia BreakingPoint FireStorm:

  • Creates 90 million simultaneous wired and wireless users at live network speeds of up to 120 Gigabits per second from a single three-slot chassis
  • Simulates hundreds of stateful applications and provides the ultimate application control necessary to stress deep packet inspection (DPI) devices. The Ixia BreakingPoint FireStorm is capable of creating 200+ applications, including AOL IM®, BGP, BlackBerry® Services, Encrypted BitTorrent™, FIX/FIXT, Google® Gmail, HTTP, HTTPS, IBM DB2®, MAPI, Microsoft® CIFS/SMB, MSN Nexus, Oracle®, PP Live,QQ IM, RADIUS, RIP, SIP, Skype, SMTP, VMware® VMotion™, Windows Live Messenger, World of Warcraft®, Yahoo!® Mail and Messenger, and more
  • Provides 35,000+ live security attacks including, malware, mobile malware, DDoS, evasions, and more
  • Performs client-side SSL Bulk Encryption at 25 Gbps with any cipher
  • Measures network latency down to 10-nanosecond resolution
  • Remains current with the Ixia BreakingPoint Application and Threat Intelligence subscription service that provides, automatically, the very latest attacks and applications

Survival in the Current DDoS threat Landscape

In this webinar, Ixia joins F5 to address the universal need for enterprises to deepen their defense against cyber attacks. This video will help you to better understand the tools and tactics used by DDoS attackers, which DDoS defenses to consider, and how to verify and tune your network.

Adapt and Evolve - How FishNet Security Helps Scale Networks

Dan Thormondsgaard, VP Solutions Architecture at FishNet Security, discusses how Ixia BreakingPoint validates its enterprise solutions, opening new opportunities and shortening FishNet’s sales cycle from months, down to a week.