Column Control DTX

BreakingPoint on Microsoft Azure — Cloud Application and Security Testing

Data Sheets

Problem: With Cloudification of Network  and Security Functions, Everything Known Becomes Unknown

 

Moving IT infrastructure to public clouds creates a model of shared responsibility between the customer and the cloud provider. This shared model eliminates the operational burden on the organization using cloud services, however they are still responsible for the security, availability, performance, and management of all the controls and processes associated with operating over the cloud infrastructure. The move to the cloud needs to deliver the same or better performance and similar security efficacy than the on-premises infrastructure.  Without a way to properly validate these cloud application workload and security controls, customer quality of experience (QoE) is at risk.

 

Solution: A Flexible Security Testing Ecosystem for Cloud Infrastructure

 

Keysight’s BreakingPoint on Azure provides scalable realworld application and threat simulation in the public cloud. Build resilient cloud infrastructure you can rely on by using BreakingPoint to maximize security investments and optimize cloud architectures. Now cloud-enabled, the market-proven BreakingPoint application offers costeffective, elastic, and sharable virtualized test capabilities that you can quickly deploy and scale across Microsoft public clouds.

 

Highlights

 

• Validate functionality of application-aware, cloudenabled devices and networks 

• Optimize cloud network security devices such as NGFW, IDS/IPS and DLP 

• Measure and compare cloud infrastructures for your specific workloads and security controls

• Validate the elastic scalability of your cloud infrastructure and security architecture 

• Understand the impact of multi-tenancy

• Get the best value when evaluating cloud security solutions by performing head-to-head "bake-offs" 

• Keep current with new application and threat intelligence updates every two weeks 

• Flexibly deploy Keysight virtual test tools that you can easily move, change, or scale up and down

• Leverage subscription-based BYOL for low startup cost and flexibility of a pay-as-you-grow OPEX model

 

Key Features

 

• Simulates more than 300 real-world application protocols to emulate cloud  application workloads

• Allows customization and manipulation of any protocol, including raw data, to validate data loss prevention (DLP), microsegmentation, and other application-based policing 

• Emulates more than 37,000 attacks and malwares

• Delivers from a single test port all types of traffic simultaneously, including legitimate traffic and malware

• Bi-monthly Application and Threat Intelligence (ATI) subscription updates ensure you are current with the latest applications and threats

• Subscription-based bring your own licensing (BYOL) model comes with an all-inclusive license that reduces startup cost 

• Seamless transition between hardware, virtual, and public cloud platforms enables easy translation of functional and performance testing in physical, virtual, and cloud environments  

• Simple and fast deployment and orchestration using CloudFormation Templates

• Automate tests using REST API

• Support for SR-IOV to deliver highly-scalable application traffic generation

• Visit www.keysight.com for more details on the BreakingPoint product

 

Protocols and features

 

BreakingPoint is powered by Keysight’s ATI subscription service that delivers a wide variety of applications and attacks to emulate traffic mix and security threats of any-sized enterprise, service provider, or government organization at scale. The application and attack emulations are complemented with BreakingPoint’s comprehensive network stack that simulates network components like IPv4, IPv6, DNS, and DHCP, helping to orchestrate the required network environments.

 

Application and threat intelligence (ATI) program

 

Keysight’s ATI program consists of several engineering units spread across the world, engaging in coordinated research and leveraging years of experience in understanding application behaviors, malicious activities, and attack methods to ensure BreakingPoint software is always updated and always current. The ATI team uses advanced surveillance techniques and cutting-edge research to identify, capture, and rapidly deliver the intelligence needed to conduct meaningful and thorough performance and security validation under the most realistic simulation conditions. Releasing updates every two weeks for more than 10 years, the ATI program comprises a library of 37,000+ attacks (Exploits, Malwares, etc.), 330+ popular applications, and over 2,000 canned tests.

Additionally, the ATI program ensures:

• Newer applications and attacks can be incorporated in BreakingPoint without the need of any firmware or OS updates

• Users stay up to date with the ever-changing cyber-world—new applications are added, and popular applications are updated to current versions

• Monthly malware packages contain fast-changing malware and botnet attacks 

• Well researched, real-world application mixes that emulate traffic patterns of diverse demographics and business verticals

×

Please have a salesperson contact me.

*Indicates required field

Preferred method of communication? *Required Field
Preferred method of communication? Change email?
Preferred method of communication?

By clicking the button, you are providing Keysight with your personal data. See the Keysight Privacy Statement for information on how we use this data.

Thank you.

A sales representative will contact you soon.

Column Control DTX