BreakingPoint VE

Breakingpoint ve icon

 

Breaking the mold on security resilience

Problem: Searching for virtual security

Organizations today need high-fidelity network testing that simulates real-world conditions. It’s the only way to make sure that network security devices are working at peak performance. To protect applications and keep your threat intelligence up to date, you need to maintain constant vigilance. But ensuring security resilience in an increasingly dangerous IT environment is only the beginning. To fully realize the savings of cloud and virtual network functions, organizations need a convenient pay-per-use model that won’t compromise the security of applications and network staging labs.

 

Breaking Point

Solution: The point of greater returns

Ixia BreakingPoint Virtual Edition (VE) provides real-world application and threat simulation for complete performance and security testing, and its elastic deployment model allows you to achieve security resilience without sacrificing scalability or flexibility.

You can quickly deploy and scale BreakingPoint VE across geo-diverse, enterprise-wide networks, thanks to its elastic and shareable virtualized test capabilities. By taking advantage of its flexible test functionality, you can quickly acquire the tools you need, as well as scale up and scale down in accordance with a project’s unique demands. And the subscription sales model reduces IT operational expenses while maximizing existing security investments for significant bottom-line benefits.  

READ THE ATI/BREAKINGPOINT NEWSLETTER

Specifications

BreakingPoint Specifications

Applications

300+ stateful application protocols supported

Test Components
  • Application Simulator
  • Client Simulator
  • Session Sender
  • Security
  • Security NP
  • Stack Scrambler
  • Routing Robot
  • Recreate
Network Access
  • IPv4/IPv6 Static Hosts
  • IPv4/IPv6 External Hosts
  • VLAN
  • IPv4/IPv6 Router
  • IPv4 DHCP Hosts
  • IPv4 DHCP Server

Labs

  • Session Sender
  • RFC 2544
  • Multicast
  • Lawful Intercept

Security: Exploits/Malware

  • 36,000+ attacks
  • 6,000+ exploits
  • 29,000+ malware
  • 100+ evasion classes
  • Multi-layer evasions

Security: Dos/DDos

Attacks include:

  • IP-based DoS attack types:
    • ICMP flood test case
    • ICMP fragmentation test case
    • Ping flood test case
  • UDP-based DoS attack types:
  • UDP flood test case
  • UDP fragmentation test case
  • Non-spoofed UDP flood test case
  • Syn flood test case
  • Syn-ack flood test case
  • Data ack and push flood test case
  • Fragmented ack test case
  • Session attack test case
  • DNS flood attack case
  • Excessive verb attack case
  • Recursive GET Floods
  • Slow POSTs
  • Zeus
  • SpyEye
  • BlackEnergy
  • Duqu
  • Pushdo Cutwail
  • TCP-based DoS attack
  • Application-layer attack
  • Botnets

Key features

Scales for complete performance and security testing
Provides VMware ESX/ESXi and KVM hypervisor support
Features a simple OVA deployment model
Delivers OpenStack compatibility
Features a web-based user interface (HTML5) and Restful API support for vBlades deployment