SOURCE: BreakingPoint Systems

BreakingPoint Systems

May 05, 2011 10:59 ET

BreakingPoint Adds 27,000 Pieces of Live Malware, Bolstering Industry's Most Complete, Definitive, and Easy-to-Use IT Resiliency Testing Product

Organizations Can Now Embed Live Malware Into Application Traffic Simulations to Accurately Validate Network Security Devices and Systems Under Attack

AUSTIN, TX--(Marketwire - May 5, 2011) - BreakingPoint, today unveiled new capabilities, including the addition of 27,000 pieces of live malware to its comprehensive, all-in-one product for IT resiliency testing. BreakingPoint's compact and easy-to-use products provide a single way to test, validate, and harden the resiliency of the full range of enterprise IT infrastructure components, from devices and networks, to applications and data centers. BreakingPoint's Application and Threat Intelligence (ATI) team has added the new live malware to a library of thousands of other security attacks including the very latest vulnerabilities, DDoS attacks, evasions, and more. The new capabilities, including the additional malware, are available within all BreakingPoint products and services and automatically for current customers.

Visit "Best of Interop" Finalist BreakingPoint at Booth #1667

Industry commentary: BreakingPoint CTO and Co-founder Dennis Cox
"BreakingPoint remains the only company in the network security testing industry with a dedicated security research team, working with a broad network of additional security research resources to provide the very latest attacks into our products," said Dennis Cox, CTO, BreakingPoint Systems. "Now with the ability to embed live malware, through a variety of real-world methods, BreakingPoint has once again proved our leadership in the network security testing arena. Organizations that are looking to truly validate IT security defenses have only one choice: hammer those defenses with live malware, the most current attacks, evasions, and more."

BreakingPoint live malware simulation accurately validates IT security defenses
BreakingPoint live malware simulation allows organizations to validate the IT security defenses of an individual network device, virtualized data centers, cloud infrastructures, and more. BreakingPoint's library of 27,000 pieces of live malware provides:

  • The most current and complete collection of live malware for simulation, including Stuxnet.
  • The ability to launch malware through multiple transports including HTTP, SMTP, POP, and IMAP.
  • Simulation of malware embedded within popular file types such as .doc, .pdf, .ppt, and .xls.
  • Generation of executable malware such as Trojan attacks.

Product functionality to be announced and demonstrated at Interop 2011 includes:

  • Data Center Resiliency Test Lab to measure and harden the performance, security, and stability of servers, virtualized servers, and application delivery infrastructures, including the automated and standardized BreakingPoint Data Center Resiliency Score.
  • Low-latency network validation with the ability to measure network latency down to 10-nanosecond resolution.
  • Massive-scale application load testing to measure the performance, stability, and capacity of applications.
  • LTE/4G Test Lab, a fully integrated single-screen configuration, which allows service providers and network device manufacturers to rapidly simulate real-world Internet traffic through an LTE infrastructure.

About BreakingPoint
As the standard for IT resiliency, BreakingPoint gives you advance insight into the performance, security, and stability of applications, devices, networks, and data centers under high-stress conditions. BreakingPoint's patented products are comprehensive, easy to use, and highly scalable, simulating the behavior of millions of online and mobile application users as they work, shop, post, stream, talk, download, spread malware, and steal data. By stressing each element of IT infrastructures under these real-world conditions, BreakingPoint quickly and accurately exposes previously impossible-to-detect stress fractures before they are exploited. Find it before they do, at www.breakingpoint.com.

Contact Information

  • Contact:
    Evan Guthrie
    BreakingPoint Systems
    (512) 821-6000
    Email Contact