Ixia BreakingPoint Storm | Deliver On


Ixia BreakingPoint Storm

Ixia BreakingPoint Storm

Global visibility into emerging cyber threats and actionable insight to harden and maintain resilient defenses

The compact 3-slot Ixia BreakingPoint Storm™ creates real-world, high-stress conditions and user behavior to provide organizations with the insight to battle-test IT infrastructures, train cyber warriors, tune systems and policies, and transform security processes to be proactive and effective. The Ixia BreakingPoint Storm is essential for:

Data Sheets

White Paper

Case Study

Videos

  • Tuning systems and policies
  • Evaluating network security devices
  • Optimizing data centers and applications
  • Hardening IT infrastructure

The Ixia BreakingPoint Storm:

  • Create 30 million simultaneous wired and wireless users at live network speeds of up to 40 gigabits per second from a single 3-slot chassis
  • Simulates hundreds of stateful applications and provides the ultimate application control necessary to stress deep packet inspection (DPI) devices. The Ixia BreakingPoint Storm is capable of creating 200+ applications, including AOL IM®, BGP, BlackBerry®
  • Services, Encrypted BitTorrent™, FIX/FIXT, Google® Gmail, HTTP, HTTPS, IBM DB2®, MAPI, Microsoft® CIFS/SMB, MSN Nexus, Oracle®, PP Live, QQ IM, RADIUS, RIP, SIP, Skype, SMTP, VMware® VMotion™, Windows Live Messenger, World of Warcraft®, Yahoo!® Mail and Messenger, and more
  • Deploy 35,000+ live security attacks, including malware, mobile malware, DDoS, evasions, and more
  • Remains always current with the Ixia BreakingPoint Application and Threat Intelligence subscription service that provides, automatically, the very latest attacks and applications

The Ixia BreakingPoint Storm's all-in-one platform provides hundreds of features, including:

  • Comprehensive testing and simulation platform
  • Real-world application traffic
  • Live security attacks
  • Port density and expandability
  • And more

Singapore Polytechnic Case Study

Survival in the Current DDoS threat Landscape

In this webinar, Ixia joins F5 to address the universal need for enterprises to deepen their defense against cyber attacks. This video will help you to better understand the tools and tactics used by DDoS attackers, which DDoS defenses to consider, and how to verify and tune your network.

Adapt and Evolve - How FishNet Security Helps Scale Networks

Dan Thormondsgaard, VP Solutions Architecture at FishNet Security, discusses how Ixia BreakingPoint validates its enterprise solutions, opening new opportunities and shortening FishNet’s sales cycle from months, down to a week.