BreakingPoint VE


Virtualized Application and Security Resilience Testing

Product Menu

  • In today's world full of cyber attacks and dynamic applications, enterprises need to know whether their networks are safe enough to deal with the worst possible consequences of cyber criminals.However, despite the highest security technology expenditure in history, how can you be sure that you have chosen the right supplier and are implementing the right security architecture? High fidelity testing eliminates speculation and brings confidence to you through facts.

  • BreakingPoint Virtual Edition (VE) provides the same high-fidelity and real testing for enterprise IT departments. Security vendors and leading operators use this test to ensure the security flexibility of the network-now in a flexible deployment mode, which is beneficial to their business.

  • BreakingPoint Virtual Edition allows you to make full use of security investments and optimize network performance to build a powerful network:

  • through higher realism and scale (over 290 applications, over 3000 pre-built Superflows, over 36,000 security components)Ensure Network Security and Flexibility. In this way, you can go beyond simple functional testing of technologies and networks to determine their performance before they are put into use, thus ensuring the successful launch of applications and security features.

  • through unlimited licensesfor faster and more flexible testing. These licenses extend from entry-level to high-performance evaluation and bring flexibility through 1GB increments, with subscription starting at $10,000 per year.

  • reductionITthe cost of the project and achieve a higher return on investment.use virtualization and industry-standard hardware platforms as well as data-driven competitive proof-of-concept to get the highest returns from IT investments.


Specifications:

BreakingPoint Specifications
Applications
  • See our detailed list of290 stateful application protocols

Test Components
  • Application Simulator

  • Client Simulator

  • Session Sender

  • Security

  • Security NP

  • Stack Scrambler

Network Access
  • IPv4/IPv6 Static Hosts

  • IPv4/IPv6 External Hosts

  • IPv4 DHCP Hosts

  • IPv4 DHCP Server

  • VLAN

  • IPv4/IPv6 Router

  • IPv4 DNS

  • IPv6 DNS

Security: Exploits/Malware
  • 36,000 attacks

  • 6,000 exploits

  • 29,000 malware

  • 100 evasion classes

  • Multi-layer evasions

Security: Dos/DDos
  • Attacks include:

  • IP-based DoS attack types:

ICMP flood test case

ICMP fragmentation test case

Ping flood test case

  • UDP-based DoS attack types:

  • UDP flood test case

  • UDP fragmentation test case

  • Non-spoofed UDP flood test case

  • Syn flood test case

  • Syn-ack flood test case

  • Data ack and push flood test case

  • Fragmented ack test case

  • Session attack test case

  • DNS flood attack case

  • Excessive verb attack case

  • Recursive GET Floods

  • Slow POSTs

  • Zeus

  • SpyEye

  • BlackEnergy

  • Duqu

  • Pushdo Cutwail

  • TCP-based DoS attack

  • Application-layer attack

  • Botnets











related products

Ixia BreakingPoint

Integrated Security and Performancetest platform

Application and Threat Intelligence Subscription

the latest application protocols and attack libraries