SOURCE: BreakingPoint Systems

cyber security products

February 10, 2011 08:41 ET

New BreakingPoint Product Simulates 90 Million LTE/4G Users Watching Videos, Texting, Shopping, Talking, and More

BreakingPoint Will Launch the Three-Slot BreakingPoint FireStorm CTM at RSA Conference 2011, Simulating 120 Gbps of Application Traffic and the Behavior of Global Smartphone Users

AUSTIN, TX--(Marketwire - February 10, 2011) - Visit BreakingPoint at RSA Conference, Booth #951 -- BreakingPoint today unveiled the BreakingPoint FireStorm Cyber Tomography Machine™, (CTM) tripling the performance records the company achieved two years ago while providing the world's most exact simulation of Internet-scale network conditions. This compact device is a three-slot chassis configuration capable of simulating 120 gigabits per second (Gbps) of blended application traffic and the load from 90 million concurrent users, more than every smartphone user in the United States.(1) The BreakingPoint FireStorm CTM reduces the cost of long-term evolution (LTE)/4G user simulation by 1,000x when compared to existing solutions and is powered by more than 30 patent and patent-pending technologies. This record-breaking performance and realism accurately model the behavior of millions of smartphone users making online purchases, placing phone calls, streaming movies, texting friends, gaming, checking email and being attacked by the latest malware.

LTE/4G performance and security validation
As global service providers begin to roll out LTE/4G networks, users are expecting a higher-performing experience. Carriers and equipment makers, on the other hand, must anticipate the crush of new users, applications, high-bandwidth activity and increasing security attacks.

The BreakingPoint FireStorm CTM can subject the Evolved Packet Core (EPC) of an LTE infrastructure to 90 million simultaneous users buying applications from the Apple® App Store, watching HD movies through Netflix®, getting the latest Android™ firmware and posting photos to Facebook®. This latest innovation from BreakingPoint not only introduces dramatic performance gains, but it also increases SSL connections per second, SSL batch encryption, port density and much more. This allows carriers to accurately measure how their LTE infrastructure will perform when deployed and throughout its life cycle.

Download the BreakingPoint FireStorm CTM data sheet (PDF).

Industry commentary: BreakingPoint CTO and Co-founder Dennis Cox
"Today, using one three-slot BreakingPoint FireStorm CTM, mobile providers, from AT&T to Verizon, and network equipment manufacturers can simulate the exact load, applications and security attacks using the most up-to-date LTE protocols," said BreakingPoint CTO Dennis Cox. "Using BreakingPoint, you can not only simulate the behavior of every smartphone user in the US, but you can also fuzz devices with malformed traffic to determine stability and fire off live security attacks to detect vulnerabilities. These are all things that will happen in a live environment, and now with BreakingPoint, you can find the problems before they cripple your network and degrade the customer experience."

Additional use cases: measures resiliency of next-generation devices, creates advanced cyber ranges and realizes cloud infrastructure investment

  • Creating the world's most advanced and cost-efficient cyber ranges and delivering realistic cyber war simulations, including Advanced Persistent Threat simulation, to train cyber defenders.
  • Simulating 120 Gbps of blended application traffic to validate the resiliency of next-generation network and data center equipment.
  • Validating that cloud and virtualized infrastructures operate at the highest performance levels and lowest cost structure, and with optimal security.
  • Automatically simulating the conditions required to analyze the resiliency of devices, networks and data centers and produce the definitive BreakingPoint Resiliency Score.

BreakingPoint FireStorm CTM: By the numbers
Leveraging all the power and flexibility of the award-winning BreakingPoint Storm CTM, the BreakingPoint FireStorm CTM takes performance to a new level with:

  • 300 percent increase in performance, including:
    • 120 Gbps of real-world application traffic simulation.
    • 3 million TCP sessions per second.
  • The ability to simulate 90 million simultaneous users.
  • 17-fold increase in SSL bulk encryption at 38 Gbps with any cipher.
  • 100 percent increase in dedicated capture buffer per port, to 4 GB.
  • 12-fold improvement in the ability to measure latency, now at 10-nanosecond resolution.
  • 50 percent increase in 10 GigE port density.
  • Twelve universal 10 GigE/1 GigE ports.
  • The ability to generate complex, higher-performance Layer 2 and 3 streams.
  • An easily swappable, solid-state 160 GB hard drive.

Both the BreakingPoint FireStorm and Storm CTMs continue to provide the industry's most comprehensive library of application and attack simulation:

  • More than 150 application protocols, including AOL® IM, Google® Gmail, FIX/FIXT, IBM® DB2®, VMware® VMotion™, RADIUS, SIP, RTSP, RTP, Netflix®, SSL, Facebook®, Skype™, TR-069 and many others. These protocols -- plus thorough protocol fuzzing and fault injection -- allow users to produce a custom mix of traffic and measure its impacts.
  • More than 4,500 current, comprehensive and global security attacks to validate that networks are secure.

How to purchase the BreakingPoint FireStorm CTM
The BreakingPoint FireStorm CTM can be purchased directly from BreakingPoint or the company's global network of resellers. Current BreakingPoint Storm CTM users can purchase individual BreakingPoint FireStorm CTM blades that can be used in their existing chassis in parallel with BreakingPoint Storm CTM 10 GigE or 1 GigE blades. Contact your BreakingPoint representative or visit to get started.

About BreakingPoint
BreakingPoint is the standard by which the world's governments, enterprises and service providers measure and harden the resiliency of their network and data center infrastructures. BreakingPoint's patented network processor architecture powers the world's first and only Cyber Tomography Machines (CTMs) to expose previously impossible-to-detect stress fractures within network and data center infrastructures before they are exploited to compromise customer data, corporate assets, brand reputation and even national security. For more information, visit

[1] "comScore Reports November 2010 U.S. Mobile Subscriber Market Share,"

Contact Information

  • Contact:
    Kyle Flaherty
    BreakingPoint Systems
    (512) 821-6059
    Email Contact