SOURCE: BreakingPoint Systems

Cyber range solutions to harden cyber defenses and train cyber warriors

February 09, 2011 08:03 ET

BreakingPoint Launches New Compact Cyber Range Device That Recreates Internet-Scale Cyberwar in Controlled Environment to Harden Infrastructure Resiliency

BreakingPoint FireStorm CTM Demonstration at RSA 2011 Will Show How This Innovation Produces Application Traffic and Live Attacks at 120 Gigabits per Second and Simulates 90 Million Global Users

AUSTIN, TX--(Marketwire - February 9, 2011) - Visit BreakingPoint at RSA Conference, Booth #951. BreakingPoint today announced the BreakingPoint FireStorm Cyber Tomography Machine™ (CTM), a compact cyber range in a single device that is essential for hardening critical IT infrastructure. The device triples the record-setting performance of the company's earlier products to provide a smarter alternative to the antiquated cyber ranges used for arming and training cyber warriors to defend national infrastructure. By leveraging BreakingPoint's patented network processor technology, the BreakingPoint FireStorm CTM creates the most precise simulation of Internet-scale cyber warfare conditions at 120 gigabits per second (Gbps) from a single three-slot device. The evolved simulations include complex and long-term Advanced Persistent Threats while generating 90 million concurrent global users and everyday application traffic and network situations. The BreakingPoint FireStorm CTM is an advanced, easy-to-use and cost-efficient replacement for complex, multimillion-dollar cyber ranges.

Industry commentary: BreakingPoint CTO and Co-founder Dennis Cox
"BreakingPoint's mission is to simulate the entire online world, from generating a real-world mix of stateful application traffic to simulating lethal security attacks, and modeling behavior from a growing global user base," said BreakingPoint CTO Dennis Cox. "The controlled chaos created by the BreakingPoint FireStorm CTM replicates the dangerous and complex scenarios military units and enterprise businesses face on a daily basis. And because the BreakingPoint FireStorm is an evolved, compact cyber range device, it can be deployed cost-effectively at every military base and enterprise. Training using these realistic scenarios prepares the military and enterprises to proactively fight against global attack. Without doing so, you are effectively sending warriors into battle unarmed."

Download the BreakingPoint cyber range white paper.

Deploying the evolved cyber range
Governments and enterprises, which make up 85 percent of the critical IT infrastructure in the United States,(1) are turning to cyber ranges to harden defenses and develop the skills of cyber warriors and IT professionals alike. The BreakingPoint FireStorm CTM's massive performance capabilities deliver the same conditions found in the world's largest cyber ranges, including those from DARPA's National Cyber Range, Department of Homeland Security's DETER test bed and other ranges maintained by the defense industrial base. Like other innovations that have been miniaturized and simplified to put vital capabilities into the hands of the masses, the BreakingPoint FireStorm CTM provides this same functionality in a compact and cost-effective device. The BreakingPoint FireStorm CTM allows government organizations to replace costly and ineffective cyber range implementations and provides an ideal device for enterprise businesses to harden their defenses and train their IT professionals.

Powered by BreakingPoint's patented network processor technology, the BreakingPoint FireStorm CTM delivers substantial application and attack traffic performance gains, and features more than 4,500 live security attacks, more than 150 real-world applications and a 17-fold increase in SSL bulk encryption to 38 Gbps with any cipher. It also provides an increase in universal 10 GigE/1GigE ports and dozens of new features. The BreakingPoint FireStorm CTM is supported by the BreakingPoint Application and Threat Intelligence (ATI) program, which distributes weekly updates of applications and attacks to maintain resiliency in the face of changing conditions. Optional Custom Application and Custom Attack tool kits enable researchers to develop and accelerate their own traffic and attacks.

Additional use cases: simulate LTE/4G networks, evaluate the resiliency of next-generation devices and realize cloud infrastructure investment
The BreakingPoint FireStorm CTM is the only single device capable of:

  • Emulating the behavior of 90 million smartphone users, enabling service providers to optimize current 3G and future LTE/4G mobile networks using a blend of voice, video, application and attack traffic at line-rate speeds.
  • Simulating 120 Gbps of blended application traffic to validate the resiliency of next-generation network and data center equipment.
  • Validating that cloud and virtualized infrastructures operate at the highest performance levels and lowest cost structure, and with optimal security.
  • Automatically simulating the conditions required to analyze the resiliency of devices, networks and data centers and produce the definitive BreakingPoint Resiliency Score.

BreakingPoint FireStorm CTM: By the numbers
Leveraging all the power and flexibility of the award-winning BreakingPoint Storm CTM, the BreakingPoint FireStorm CTM takes performance to a new level with:

  • 300 percent increase in performance, including:
    • 120 Gbps of real-world application traffic simulation.
    • 3 million TCP sessions per second.
  • The ability to simulate 90 million simultaneous users.
  • 17-fold increase in SSL bulk encryption at 38 Gbps with any cipher.
  • 100 percent increase in dedicated capture buffer per port, to 4 GB.
  • 12-fold improvement in the ability to measure latency, now at 10-nanosecond resolution.
  • 50 percent increase in 10 GigE port density.
  • Twelve universal 10 GigE/1 GigE ports.
  • The ability to generate complex, higher-performance Layer 2 and 3 streams.
  • An easily swappable, solid-state 160 GB hard drive

Both the BreakingPoint FireStorm and Storm CTMs continue to provide the industry's most comprehensive library of application and attack simulation:

  • More than 150 application protocols, including AOL® IM, Google®  Gmail, FIX/FIXT, IBM®  DB2®, VMware®  VMotion™, RADIUS, SIP, RTSP, RTP, Netflix®, SSL, Facebook®, Skype™, TR-069 and many others. These protocols -- plus thorough protocol fuzzing and fault injection -- allow users to produce a custom mix of traffic and measure its impacts.
  • More than 4,500 current, comprehensive and global security attacks to validate that networks are secure.

How to purchase the BreakingPoint FireStorm CTM
The BreakingPoint FireStorm CTM can be purchased directly from BreakingPoint or the company's global network of resellers. Current BreakingPoint Storm CTM users can purchase individual BreakingPoint FireStorm CTM blades that can be used in their existing chassis in parallel with BreakingPoint Storm CTM 10 GigE or 1 GigE blades. Contact your BreakingPoint representative or visit www.breakingpoint.com to get started. You can find also find BreakingPoint products and services listed on TestMart (GSA contract number GS-24F-0066M) and on GSA Advantage.

About BreakingPoint
BreakingPoint is the standard by which the world's governments, enterprises and service providers measure and harden the resiliency of their network and data center infrastructures. BreakingPoint's patented network processor architecture powers the world's first and only Cyber Tomography Machines (CTMs) to expose previously impossible-to-detect stress fractures within network and data center infrastructures before they are exploited to compromise customer data, corporate assets, brand reputation and even national security. For more information, visit www.breakingpoint.com.

(1) Cyber Security Research and Development: Broad Agency Announcement (BAA), Department of Homeland Security: Jan. 26, 2011

Contact Information

  • Contact:
    Kyle Flaherty
    BreakingPoint Systems
    (512) 821-6059
    Email Contact