BreakingPoint VE
Virtualized Application and Security Resilience Testing
Product Menu
In today's world full of cyber attacks and dynamic applications, enterprises need to know whether their networks are safe enough to deal with the worst possible consequences of cyber criminals.However, despite the highest security technology expenditure in history, how can you be sure that you have chosen the right supplier and are implementing the right security architecture? High fidelity testing eliminates speculation and brings confidence to you through facts.

BreakingPoint Virtual Edition (VE) provides the same high-fidelity and real testing for enterprise IT departments. Security vendors and leading operators use this test to ensure the security flexibility of the network-now in a flexible deployment mode, which is beneficial to their business.
BreakingPoint Virtual Edition allows you to make full use of security investments and optimize network performance to build a powerful network:
through higher realism and scale (over 290 applications, over 3000 pre-built Superflows, over 36,000 security components)Ensure Network Security and Flexibility. In this way, you can go beyond simple functional testing of technologies and networks to determine their performance before they are put into use, thus ensuring the successful launch of applications and security features.
through unlimited licensesfor faster and more flexible testing. These licenses extend from entry-level to high-performance evaluation and bring flexibility through 1GB increments, with subscription starting at $10,000 per year.
reductionITthe cost of the project and achieve a higher return on investment.use virtualization and industry-standard hardware platforms as well as data-driven competitive proof-of-concept to get the highest returns from IT investments.
Specifications:
| BreakingPoint Specifications | |
| Applications |
|
| Test Components |
|
| |
| |
| |
| |
| |
| Network Access |
|
| |
| |
| |
| |
| |
| |
| |
| Security: Exploits/Malware |
|
| |
| |
| |
| |
| Security: Dos/DDos |
|
| |
ICMP flood test case | |
ICMP fragmentation test case | |
Ping flood test case | |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
related products
Integrated Security and Performancetest platform | Application and Threat Intelligence Subscription the latest application protocols and attack libraries |

