APS-100GE/400GE 系列

APS 100GE 400GE

業界最強大的應用和網路安全測試平台

已經擁有此產品? 瀏覽技術支援網頁

兼顧超大規模網路對安全性與效能的要求

雲端運算、人工智慧、機器學習等創新技術,正推動著各行各業加速進行數位轉型,資料中心業者和服務供應商也因而面臨著加密流量暴增,以及層出不窮的攻擊等種種挑戰。 400GE 架構能以空前的速度,傳輸超大量的流量,但它們對 NGFW 和應用交付控制器等關鍵基礎設施有更高的要求。因此,資料中心網路設備製造商和網路業者必須驗證其解決方案,能夠在不犧牲安全性和可用性的前提下,支援超大規模負載。

Keysight Data Center Infrastructure
APS Series application and security test platform

靈活的模組化超大規模測試平台

APS 100GE/400GE 系列採模組化設計,使用者可堆疊多個 APS-ONE-100 設備,將其規模擴充至 16 個運算節點,所有運算節點均由一台 APS-M8400 設備管理,可透過是德科技領先業界的應用交付和安全測試工具,打造一個可承載超過 51 億個 TCP 同時連接、同時產生超過 3.2 Tbps L47 流量的系統。

超大規模 400GE 測試能力有何優點?

一台 APS-ONE-100 設備可提供無與倫比的 TLS 效能,例如每秒高達 100K TLS 連接、320 萬 TLS 同時連接,以及 150 Gbps 的加密傳輸速率

可使用 APS-M1010 控制器擴充至最多 10 個運算節點,以實現超大規模傳輸速率,例如每秒 1M 個 TLS 連接、32M 個 TLS 同時連接,以及 1.5 Tbps 加密傳輸速率等。

需要更大的測試容量? 藉由搭配使用 APS-M8400 設備及其 8x400GE QSFP-DD 原生 I/O,可匯集多達 16 個運算節點,以打造業界最強大的應用與安全測試平台,可實現每秒 1.6M 個 TLS 連接、51M 個 TLS 同時連接,以及 2.4 Tbps 的加密傳輸速率。

觀看 BreakingPoint 如何對 FortiGate 7121F 企業安全防護新世代防火牆(NGFW) 進行超高效能測試

觀看 BreakingPoint 如何對 FortiGate 7121F 新世代防火牆(NGFW)進行 SSL 效能測試

Keysight APS-M1010 Controller

集中式管理

APS 100GE/400GE 系列與 APS-M1010 的組合,可集中管理 10 個運算節點。如搭配使用 APS-M8400,可擴充至 16 個運算節點,方便您在單一平台中查看堆疊內的所有設備,進而簡化裝置配置和軟體更新的安裝。

精選資源

White Papers 2020.05.21

Making Dollar$ and Sense Out of Enterprise Security Testing

Making Dollar$ and Sense Out of Enterprise Security Testing

If your job involves addressing and responding to the security challenges your organization faces, this paper can help you. We’ll explore traditional approaches to assessing security investments, look at the financial benefits of testing, and debunk the excuses that keep IT organizations from validating their security infrastructure and deployment processes. And last but not least, we’ll introduce new solutions and best practices for staying a step ahead of the evolving threat landscape. Ignoring security resilience testing is a “head-in-the-sand” approach that can cost organizations millions, and individuals their jobs. We’ll look at solutions and technologies that can cost-effectively model and apply the realism found in your company’s one-of-a-kind network, right down to your applications and even a single user’s behavior, including both legitimate enterprise users and malicious attackers. Using this approach and economical new techniques, IT managers can quickly evaluate how specific technologies such as NGFWs, or a layered security architecture, will perform and safeguard application performance in their own unique environments. This paper covers: Opportunities for cost-reduction; Selecting optimized and cost-effective security for your network; Right-sizing investments to meet your company’s business AND security needs; Ensuring your network has the high level of security resilience needed to defend against attacks; Readying company personnel for inevitable attacks.

2020.05.21

是德科技客服中心提供您需要的協助