Specifications

BreakingPoint Specifications

Applications

300+ stateful application protocols supported

Test Components
  • Application Simulator
  • Client Simulator
  • Session Sender
  • Security
  • Security NP
  • Stack Scrambler
  • Routing Robot
  • Recreate
Network Access
  • IPv4/IPv6 Static Hosts
  • IPv4/IPv6 External Hosts
  • VLAN
  • IPv4/IPv6 Router
  • IPv4 DHCP Hosts
  • IPv4 DHCP Server

Labs

  • Session Sender
  • RFC 2544
  • Multicast
  • Lawful Intercept

Security: Exploits/Malware

  • 36,000+ attacks
  • 6,000+ exploits
  • 29,000+ malware
  • 100+ evasion classes
  • Multi-layer evasions

Security: Dos/DDos

Attacks include:

  • IP-based DoS attack types:
    • ICMP flood test case
    • ICMP fragmentation test case
    • Ping flood test case
  • UDP-based DoS attack types:
  • UDP flood test case
  • UDP fragmentation test case
  • Non-spoofed UDP flood test case
  • Syn flood test case
  • Syn-ack flood test case
  • Data ack and push flood test case
  • Fragmented ack test case
  • Session attack test case
  • DNS flood attack case
  • Excessive verb attack case
  • Recursive GET Floods
  • Slow POSTs
  • Zeus
  • SpyEye
  • BlackEnergy
  • Duqu
  • Pushdo Cutwail
  • TCP-based DoS attack
  • Application-layer attack
  • Botnets
Breakingpoint ve icon

 

Breaking the mold on security resilience

Problem: Searching for virtual security

Organizations today need high-fidelity network testing that simulates real-world conditions. It’s the only way to make sure that network security devices are working at peak performance. To protect applications and keep your threat intelligence up to date, you need to maintain constant vigilance. But ensuring security resilience in an increasingly dangerous IT environment is only the beginning. To fully realize the savings of cloud and virtual network functions, organizations need a convenient pay-per-use model that won’t compromise the security of applications and network staging labs.

Breaking Point

Solution: The point of greater returns

AwardIxia BreakingPoint Virtual Edition (VE) provides real-world application and threat simulation for complete performance and security testing, and its elastic deployment model allows you to achieve security resilience without sacrificing scalability or flexibility.

You can quickly deploy and scale BreakingPoint VE across geo-diverse, enterprise-wide networks, thanks to its elastic and shareable virtualized test capabilities. By taking advantage of its flexible test functionality, you can quickly acquire the tools you need, as well as scale up and scale down in accordance with a project’s unique demands. And the subscription sales model reduces IT operational expenses while maximizing existing security investments for significant bottom-line benefits.

BREAKINGPOINT APPLICATION PROTOCOLS

KEY FEATURES

  • Generates scalable Real-World Traffic™ for complete performance and security testing
  • Offers a simple OVA deployment model
  • Features a web-based user interface (HTML5) and Restful API support for vBlades deployment
  • Provides VMware ESX/ESXi and KVM hypervisor support
  • Delivers OpenStack compatibility

BreakingPoint Solves Your Real-World Test Challenges

  • Next-Gen Firewalls
  • DDoS Protection
  • Data Center Microsegmentation
  • Machine Learning & Analytics
  • SCADA Network Security
  • NGFW

    No organization escapes the reach of hackers — if you’re connected to the Internet, they have a way to enter. The response is deployment of next-generation firewalls (NGFW), intrusion detection systems (IDS), and whatever future device promises better protection. To ensure minimal impact to network performance and verify the accuracy of complex network security infrastructures, businesses need a robust test solution.

    BreakingPoint validates an organization’s security infrastructure, reduces the risk of network degradation by almost 80%, and increases attack readiness by nearly 70%. It’s Real World Traffic™ testing simulates legitimate traffic, distributed denial of service (DDoS), exploits, malware, and fuzzing. Read more.

  • DDoS

    Today, distributed denial of service (DDoS) attacks are a big risk to any business with an online presence. Organizations need to know if their networks can fend-off the flood of traffic coming from hundreds of thousands of compromised systems while still accepting normal business traffic. Since every update in the network may impact the efficacy of your DDoS mitigation solution, validation must be a continual process.

    BreakingPoint simulates both normal application traffic and security threats at scale so you can validate critical data points like number of packets dropped by your DDoS mitigation solution, how your solution functions in a real attack, what level of service you can provide while under attack, and how your people and process react to and withstand an attack. Read more.

  • Microsegmentation

    Data center operators are using a collection of virtual machines or containers to segment the network by meaningful workloads. With workloads classified by the specific functions they serve (like web, application, database, services workloads), organizations can specify security measures relevant to each workload type. But testing the security and performance of these specialized workloads is challenging.

    With BreakingPoint VE, you can simulate the characteristics of various workloads and lateral movement of threat vectors, delivering a seamless test function to assess and manage your microsegmentation deployment. Read more.

  • Machine Learning

    Machine learning and big data analytics are the new hope for security teams to defeat cyber criminals. It is critical that these systems have access to meaningful domain-specific data, events, and logs to establish the baseline behavior of a domain, and eventually help in understanding the tool’s ability to detect anomalies that diverge from the baseline behavior.

    With real-world traffic® generation, BreakingPoint will help increase the effectiveness of your solution and reduce errors and false positives. It also helps tool vendors create realistic and relevant proof-of-concept (PoC) demonstrations and differentiation for their solutions. Read more.

  • SCADA

    With SCADA operating over IP networks, the line between IT and OT has blurred...however, many OT teams are not prepared to handle threats in ICS networks. Organizations are taking notice of the threats to SCADA networks and the possible impacts of breaches. It is also clear that, despite being much farther from the standard network security demarcation zones, SCADA networks continue to be exceptionally vulnerable to cyber-attacks.

    Validation in the lab with BreakingPoint’s real-world application traffic and security attacks can ensure SCADA networks are resilient and secure. Increasing the attack readiness of both your ICS networks and people will go a long way in increasing the resiliency of the SCADA/ICS systems of today and in the future. Read more.