Column Control DTX

BreakingPoint Virtual Edition (VE): Virtualized Application and Security Testing

Data Sheets

Problem: The Virtualization of Network Security Functions Brings Many Unknowns

 

The current generation of networks need to adapt quickly and facilitate change. Strategies like Network Functions Virtualization (NFV) and Software Defined Networking (SDN) provide powerful flexibility gains by moving traditional application and security functions (such as application delivery, load balancing, data packet inspection, firewall, intrusion prevention system, and sandbox components) off dedicated hardware onto virtualized servers. These virtualized devices must deliver the same or better performance and security efficacy comparing with the traditional hardware appliances. Without a way to properly test these virtualized application and security devices, customer quality of experience is at risk.

 

Solution: An Easy-to-Use Testing Ecosystem for Virtualized Infrastructure

 

BreakingPoint VE provides scalable real-world application and threat simulation in a deployment model that fits IT budgets by leveraging virtualization and industry-standard hardware platforms. Build resilient physical or virtual networks you can rely on by using BreakingPoint VE to maximize security investments and optimize network architectures. The market-proven BreakingPoint application offers cost-effective, elastic, and sharable virtualized test capabilities that are quickly deployed and scaled across geo-diverse enterprise-wide networks. This is made possible by a flexible traffic generation and analysis solution to validate physical and virtual devices and networks at scale. The real-time statistics allow quick identification of security problems and isolate the breaking points. Because BreakingPoint VE is as easy to use as it is effective, you do not have to be a security or virtualization expert to achieve complete endto-end service validation. 

 

The BreakingPoint VE subscription model is aligned with enterprise project-based IT OpEx funding requirements. Acquire the tools quickly, scale up and scale down as project needs demand, and deploy anywhere with virtualization speed and simplicity.

 

Visit www.keysight.com for more information on the BreakingPoint VE product.

 

Highlights

 

• Test the most critical components of virtual and physical application-aware devices and networks. Validate various attacks and distributed denial of service (DDoS) defenses.

• Optimize the configuration of virtual or physical network security devices such as IDS, IPS, DLP, UTM, NGFW, WAF, web proxy, and others.

• Keep up with the ever-evolving threat landscape by updating your applications, attacks, and malware via the daily Applications and Threats Intelligence updates. 

• Assess how virtual machine mobility impacts application reliability and scalability. Run the tests during live migration to ensure minimum network downtime.

• Validate next generation 5G / NFV networks by testing within Private Clouds / Telco Clouds powered by OpenStack or VMware vCenter orchestration.

• Understand how network applications are affected by deployment within different Public Clouds such as Alibaba Cloud, Amazon AWS, Google Cloud, or Microsoft Azure.

• Leverage subscription-based licensing that enables the flexibility of pay-as-you-grow OpEx model with different licenses available in multiple performance levels (such as 1G / 10G / 100G).

 

Key Features

 

• Provides comprehensive protocol coverage across a large set of network security applications.

• Simulates more than 300 real-world application protocols and 37,000 attacks and malwares.

• Allows for customization and manipulation of any protocol field, including raw data.

• Generates a mix of protocols at high speed with realistic protocol distribution.

• Delivers all types of traffic simultaneously, including legitimate traffic, DDoS, and malware.

• Application and Threat Intelligence (ATI) subscription includes latest applications and threats.

• Measures metrics like concurrent connections, connection rate, simulated users, or throughput.

• Powerful statistics engine with high level aggregated views as well as detailed drilldown views.

• Common BreakingPoint user interface and experience across both Hardware / Virtual products.

• Easy transition between Hardware / Virtual platforms through common configurations and scripts.

• Comprehensive hypervisor support for stand-alone platforms like VMware ESXi / KVM / Hyper-V.

• Comprehensive orchestration support in Private Clouds based on VMware vCenter / OpenStack.

• Comprehensive support for Public Clouds inside Amazon AWS / Google Cloud / Microsoft Azure.

• Includes Virtual Machines with Virtual System Controller / Virtual Blade roles.

• Provides software optimized for protocol emulation and traffic generation in virtual environments.

• Flexible all-inclusive subscription licensing model reduces startup cost and enables easier growth.

• Common License Server shared among IxLoad VE, IxNetwork VE, BreakingPoint VE, and others

×

Please have a salesperson contact me.

*Indicates required field

Preferred method of communication? *Required Field
Preferred method of communication? Change email?
Preferred method of communication?

By clicking the button, you are providing Keysight with your personal data. See the Keysight Privacy Statement for information on how we use this data.

Thank you.

A sales representative will contact you soon.

Column Control DTX