Column Control DTX

BreakingPoint on Google Cloud Platform — Cloud Application and Security Testing

Data Sheets

Problem: With Cloudification of Network  and Security Functions, Everything Known Becomes Unknown

 

Moving IT infrastructure to public clouds creates a model  of shared responsibility between the customer and the cloud provider. This shared model eliminates the operational burden on the organization using cloud services, however they are still responsible for the security, availability, performance, and management of all the controls and processes associated with operating over the cloud infrastructure. The move to the cloud needs to deliver the same or better performance and similar security efficacy than the on-premises infrastructure.  Without a way to properly validate these cloud application workload and security controls, customer quality of experience (QoE) is at risk.

 

Highlights

 

• Validate functionality of application-aware, cloudenabled devices and networks 

• Optimize cloud network security devices such as NGFW, IDS/IPS and DLP 

• Measure and compare cloud infrastructures for your specific workloads and security controls

• Validate the elastic scalability of your cloud infrastructure and security architecture 

• Understand the impact of multi-tenancy

• Get the best value when evaluating cloud security solutions by performing head-to-head "bake-offs" 

• Keep current with new application and threat intelligence updates every two weeks 

• Flexibly deploy Keysight virtual test tools that you can easily move, change, or scale up and down x

• Leverage subscription-based BYOL for low startup cost and flexibility of a pay-as-you-grow OPEX model

 

Solution: A Flexible Security Testing Ecosystem for Cloud Infrastructure

 

Keysight’s BreakingPoint on Google Cloud Platform (GCP) provides scalable real-world application and threat simulation in the public cloud. Build resilient cloud infrastructure you can rely on by using BreakingPoint to maximize security investments and optimize cloud architectures. Now cloud-enabled, the market-proven BreakingPoint application offers cost-effective, elastic, and sharable virtualized test capabilities that you can quickly deploy and scale across Google public clouds.

 

Key Features

 

• Simulates more than 300 real-world application protocols to emulate cloud application workloads

• Allows customization and manipulation of any protocol, including raw data, to validate data loss prevention (DLP), microsegmentation, and other application-based policing 

• Emulates more than 37,000 attacks and malwares

• Delivers from a single test port all types of traffic simultaneously, including legitimate traffic and malware

• Bi-monthly Application and Threat Intelligence (ATI) subscription updates ensure you are current with the latest applications and threats

• Subscription-based bring your own licensing (BYOL) model comes with an all-inclusive license that reduces startup cost 

• Seamless transition between hardware, virtual, and public cloud platforms enables easy translation of functional and performance testing in physical, virtual, and cloud environments  

• Simple and fast deployment and orchestration using CloudFormation Templates

• Automate tests using REST API

• Support for SR-IOV and DPDK to deliver highly-scalable application traffic generation

• Visit www.keysight.com for more details on the BreakingPoint product

×

Please have a salesperson contact me.

*Indicates required field

Preferred method of communication? *Required Field
Preferred method of communication? Change email?
Preferred method of communication?

By clicking the button, you are providing Keysight with your personal data. See the Keysight Privacy Statement for information on how we use this data.

Thank you.

A sales representative will contact you soon.

Column Control DTX