Column Control DTX

Yahoo! Ensures Performance, Security, and Stability of Network Equipment and Cloud Infrastructure

Case Studies

CHALLENGE

 

With one of the world’s largest network and cloud infrastructures supporting millions of users throughout the world, Yahoo! is focused on delivering fast and reliable commerce, communications, and social networking services. Yahoo!’s vision is to be the center of people’s online lives by delivering personally relevant, meaningful Internet experiences.

 

Yahoo!’s traffic volume and application complexity has grown rapidly over the past decade, driving the company to build out a massive network and application infrastructure to support more and more load—resulting in higher-capacity servers, load balancers, routers, and switches, plus massive firewalls. Because of the demands of cloud computing and increasing stress on applications, Yahoo! needed to invest in the equipment necessary to build out a resilient infrastructure, designed to handle extreme load and operate effectively in an increasingly-treacherous cyber landscape.

 

Previously, however, Yahoo!’s security team had no way to stress and measure the resiliency of the company’s enormous infrastructure to ensure performance, availability, and security. According to Yahoo!, the most important aspect of the proposed solution was to validate the performance, functionality, and capacity of its systems. However, before making an investment, it was critical for the security team to fully understand the performance and functionality of the equipment by subjecting it to a wide mix of applications, including video, instant message, web, and more, as well as live security attacks and load from millions of users.

 

SOLUTION

 

Yahoo! turned to BreakingPoint to recreate realistic Internet-scale network conditions to validate the performance and security of the company’s network, data center, and application infrastructures. In particular, the security team used the solution to:

 

• Standardize the validation of deep packet inspection (DPI)–based network and security products prior to purchase and prior to deployment in the production network

• Understand in advance how high-performance, content-aware products will perform when faced with Yahoo!’s unique architecture and mix of application traffic and network conditions

• Establish a standardized, deterministic, and vendor-neutral method for evaluating and certifying the resiliency of network and data center devices using the scientific BreakingPoint Resiliency Score™

• Simulate real application traffic and user load to produce a series of measurements of server farms on the other end of server load balancers

• Anticipate the real-world effects of malicious attacks and malformed packets with the BreakingPoints protocol fuzzing capabilities and live security attacks

 

RESULTS

 

By relying on the BreakingPoint solution to stress its infrastructure with the load of millions of users, Yahoo! is able to:

 

• Measure and add capacity to withstand peak load by subjecting applications, servers, and network infrastructure to application traffic from millions of users as well as cyber attacks

• Conduct repeatable and deterministic network equipment evaluations with the company’s own network conditions to improve return on IT investments

• Use thorough and comprehensive protocol fuzzing to probe every possible weakness in the infrastructure

• Validate defenses against large-scale distributed denial of service (DDoS) attacks

×

Please have a salesperson contact me.

*Indicates required field

Preferred method of communication? *Required Field
Preferred method of communication? Change email?
Preferred method of communication?

By clicking the button, you are providing Keysight with your personal data. See the Keysight Privacy Statement for information on how we use this data.

Thank you.

A sales representative will contact you soon.

Column Control DTX