BreakingPoint Applications and Security Testing

Data Sheets

Problem: Real-Time Challenges for Real-World Testing


These days, organizations rely on a wide variety of security solutions to protect their networks from cyber-attacks and traffic anomalies. But the more tools deployed, the more complex a security infrastructure becomes. The result: a hodgepodge of security solutions that are tough to verify and challenging to scale. Worse yet, these complex system interactions pose a serious risk to security performance and network resiliency.


Solution: An Easy-to-Use Testing Ecosystem for Modern Network Needs


To counter such challenges, businesses require an application and security test solution that can verify the stability, accuracy, and quality of networks and network devices.

Enter BreakingPoint. By simulating real-world legitimate traffic, distributed denial of service (DDoS), exploits, malware, and fuzzing, BreakingPoint validates an organization’s security infrastructure, reduces the risk of network degradation by almost 80 percent, and increases attack readiness by nearly 70 percent.

How might a particular configuration or security setup withstand a cyber-attack? BreakingPoint addresses that by simulating both good and bad traffic to validate and optimize networks under the most realistic conditions. Security infrastructures can also be verified at high scale, ensuring ease of use, greater agility, and speedy network testing.




• Measure and harden the performance of network and security devices

• Validate network and data center performance by recreating busy hour Internet traffic at scale

• Stress network infrastructures with more than 110,000 security attacks, malware, botnets, and evasion techniques

• Find network issues and prepare for the unexpected with the industry’s fastest protocol fuzzing capabilities

• Emulate sophisticated, large-scale DDoS and botnet attacks to expose hidden weaknesses

• Ensure the always-on user experience amid complexity and exploding traffic volume

• Train staff by simulating highly realistic cyber-range/training environment

• Validate the performance and security resiliency of service provider networks using emulations over 3G/4G/LTE 

• Amplify test traffic realism by running TrafficREWIND summary configurations that replicate the dynamic nature of production networks and applications

BreakingPoint test solutions ensure:

• Network security

o Maximize security investments with onsite network-specific proof-of-concept 

o (PoC) validation

o Optimize next-generation firewalls (NGFWs), intrusion prevention systems (IPS), and other security devices

o Validate DDoS defenses 

o Build networks and cloud infrastructures that are resilient to attacks

• Network performance

o Ensure the always-on user experience during complexity and exploding traffic volume

o Validate and optimize 3G and 4G/LTE networks under the most realistic conditions, using real mobile applications over mobile tunneling and roaming, and get per-user equipment (UE) statistics


Key Features


• Simulates more than 640 real-world application protocols

• Allows for customization and manipulation of any protocol, including raw data

• Generates a mix of protocols at high speed with realistic protocol weight

• Offers HTTP1.0, HTTP1.1 and HTTP/2 as transport with support for NAT and Proxy (for selected applications)

• Supports more than 110,000 attacks and malwares

• Delivers from a single port all types of traffic simultaneously, including legitimate traffic, DDoS, and malware

• Bi-monthly Application and Threat Intelligence (ATI) subscription updates ensure you are current with the latest applications and threats

• Combined with the CloudStorm platform, BreakingPoint reaches a staggering performance with a fully-populated chassis—2.4 Tbps / 1.44 billion sessions and 42 million connections per second—to emulate enterprise-wide networks to continentscale mobile carrier networks

• Leverage the hyperscale performance of the new APS-100/400GE Series platform. A single APS-ONE-100 delivers unparalleled real-world TLS performance of up to 100K TLS connections per second and 3.2M TLS concurrent connections and 150Gbps encrypted throughput. The ground-breaking scale of a 10-appliance system generates 1M TLS CPS, 32M TLS concurrent connections, and 1.5 Tbps encrypted TLS throughput.   


Please have a salesperson contact me.

*Indicates required field

Select a preferred method of communication*Required Field
Preferred method of communication? Change email?
Preferred method of communication?

By continuing, you are providing Keysight with your personal data. See the Keysight Privacy Statement for information on how we use this data.

Thank you

A sales representative will contact you soon.