SlideShare une entreprise Scribd logo
1  sur  2
Télécharger pour lire hors ligne
BreakingPoint Application and Threat Intelligence Program




BreakingPoint Application and Threat Intelligence
(ATI) Program
A comprehensive service and support program for optimizing and hardening the resiliency of IT
infrastructures that includes product updates, authentic application protocols, real-world security attacks,
and responsive support

BreakingPoint Cyber Tomography Machine™ (CTM) products expose
                                                                             The BreakingPoint ATI Program includes:
previously impossible-to-detect vulnerabilities and weaknesses in
                                                                               •	 All software updates and enhancements
applications, devices, networks, and data centers before they can
                                                                               •	 Frequent application protocol releases to library of
adversely affect IT operations.
                                                                                  150+ applications

Every BreakingPoint CTM is designed for speed, realism, and ease               •	 Research into emerging security vulnerabilities
of use. A key aspect of the design is the BreakingPoint Application            •	 Frequent security updates to library of 4,500+ security
and Threat Intelligence (ATI) Program, a responsive and all-inclusive             attacks, 100+ evasion techniques, and 28,000+ pieces of
service and support program. Our team of dedicated application                    live malware, including mobile malware
and security researchers provides everything you need for thorough             •	 Microsoft® Tuesday updates within 24 hours
measurement of the performance, security, and stability of IT                  •	 Priority access to problem resolution team
infrastructures, including access to all application protocols, security       •	 Personalized service and support
attacks, product enhancements, and full service and support. In                •	 Single point of contact for problem resolution
one comprehensive program, you can tap into the resources and                  •	 Convenient technical support options
expertise you need to keep your simulations current and realistic.             •	 Community and educational resources
The ATI Program includes all of the following:

Frequent Application Protocol Updates                                      and Data Loss Prevention (DLP) products. These are the Evergreen
With a current ATI Program agreement, you are assured of the               Application Protocols supported:
most realistic simulation conditions possible with access to the             •	 AOL Messaging
latest applications. The BreakingPoint ATI team uses advanced                •	 AOL Webmail
surveillance techniques and methodologies to identify, capture,              •	 Google Mail (Gmail)
and rapidly deliver the emergent business, consumer, and malicious           •	 Google Talk
applications you need to conduct meaningful and thorough                     •	 ICQ
performance and security validation.
                                                                             •	 Jabber (XMPP)
                                                                             •	 MSN Messaging
Consistent with BreakingPoint’s all-inclusive approach, your ATI
                                                                             •	 Windows Live Mail
Program account gives you automatic access to all newly released
protocols, software fixes, operating system updates, and other               •	 Yahoo! Mail
resource downloads.                                                          •	 Yahoo! Messaging


Evergreen Application Protocols                                            Updates from the Industry’s Top Security Researchers
Content-aware network and security devices are at a severe                 Security threats are constantly evolving, with new vulnerabilities
disadvantage if they are not tested using the most current versions        discovered each day. Your simulation conditions must reflect the latest
of the most popular application protocols. The BreakingPoint               security threats so that you can ensure your equipment will perform
Evergreen Applications program addresses this need by providing            reliably and protect your infrastructure from the most advanced and
ever-current versions of popular Web and network applications              malicious traffic. Our team of experts does the research for you by
for validating deep packet inspection (DPI), Lawful Intercept (LI),        identifying and generating security attacks that meet your needs.
BreakingPoint Application and Threat Intelligence Program


We don’t license our security attacks from other vendors: Our award-                           Warranty Provisions/Extended Hardware Options
winning staff of application and security researchers provides timely                          BreakingPoint provides a one (1) year standard hardware warranty
updates, ensuring we deliver the industry’s most complete security                             or an optional extended hardware warranty. Please contact
updates. Currently we provide:                                                                 your sales representative or an authorized reseller for additional
  •	 4,500+ security strikes and 100+ evasion techniques                                       information on extended hardware warranty options.
  •	 28,000+ pieces of live malware, including mobile malware,
     which can be launched through multiple transports, including                              More Information
     HTTP, SMTP, POP, and IMAP, and embedded within popular file                               Custom ATI Program packages are available for site licenses
     types such as .doc, .pdf, .ppt, and .xls                                                  and multi-year programs. For more information about how the
  •	 The industry’s most comprehensive Microsoft® Tuesday                                      BreakingPoint ATI Program can help you harden your IT infrastructure,
     coverage, with 24-hour response time                                                      please contact your regional sales representative today.
  •	 SYN flood attacks with more than 1million connections per
     second
                                                                                                  Contact BreakingPoint
  •	 The ability to direct attacks at networking devices or target
     servers                                                                                      Learn more about BreakingPoint products and services by

  •	 Application layer fuzzing to detect previously unknown                                       contacting a representative in your area.
     vulnerabilities                                                                              1.866.352.6691 U.S. Toll Free
                                                                                                  www.breakingpoint.com
Convenient Technical Support Options
BreakingPoint offers a range of responsive support options to ATI                                 BreakingPoint Global Headquarters
Program customers. You can get answers to questions and requests,                                 3900 North Capital of Texas Highway
including phone-based, email, and online support. Experienced                                     Austin, TX 78746
technical representatives are available Monday through Friday,                                    email: salesinfo@breakingpoint.com
7:00 am – 7:00 pm central time. Or you can bypass phone support                                   tel: 512.821.6000
and submit your service requests online. Open a new request or
                                                                                                  toll free: 866.352.6691
update and check the status of existing requests via email at your
convenience.
                                                                                                  BreakingPoint EMEA Sales
                                                                                                  Paris, France
Authorized Technical Support Contacts
                                                                                                  email: emea_sales@breakingpoint.com
As an ATI Program customer, you may designate people within your
                                                                                                  tel: + 33 6 08 40 43 93
organization who are authorized to submit an unlimited number of
service requests to our support technicians. If desired, BreakingPoint
will designate a support specialist to serve as your single point of                              BreakingPoint APAC Sales
contact for requests. This expert will become familiar with your                                  Suite 2901, Building #5, Wanda Plaza
environment and facilitate the delivery of solutions that meet your                               No. 93 Jianguo Road
needs.                                                                                            Chaoyang District, Beijing, 100022, China
                                                                                                  email: apac_sales@breakingpoint.com
Professional Services Engagements                                                                 tel: + 86 10 5960 3162
ATI Program customers have free access to all Web-based tutorials
and may also purchase on-site technical training. Our expert
consultants are available on a contract basis to review your
simulation and measurement plans and ensure that they are
current, rigorous, and comprehensive. Our Professional Services
staff can also visit your site to address your most pressing issues and
questions or oversee critical projects.




www.breakingpoint.com
© 2005 – 2011. BreakingPoint Systems, Inc. All rights reserved. The BreakingPoint logo is a trademark of BreakingPoint Systems, Inc.
All other trademarks are the property of their respective owners.

Contenu connexe

Tendances

Thinking about SDN and whether it is the right approach for your organization?
Thinking about SDN and whether it is the right approach for your organization?Thinking about SDN and whether it is the right approach for your organization?
Thinking about SDN and whether it is the right approach for your organization?Cisco Canada
 
Dell sonicwall connected security
Dell sonicwall connected securityDell sonicwall connected security
Dell sonicwall connected securityMotty Ben Atia
 
Netflow analyzer- Datasheet
Netflow analyzer- DatasheetNetflow analyzer- Datasheet
Netflow analyzer- DatasheetINSPIRIT BRASIL
 
AGILE SECURITY™ Security for the Real World
AGILE SECURITY™ Security for the Real WorldAGILE SECURITY™ Security for the Real World
AGILE SECURITY™ Security for the Real WorldCisco Russia
 
Kerio Control 7 Overview
Kerio Control 7 OverviewKerio Control 7 Overview
Kerio Control 7 Overviewrkoscak
 
Plnog 3: Zbigniew Skurczyński - Wirtualizacja i optymalizacja infrastruktury
Plnog 3: Zbigniew Skurczyński -  Wirtualizacja i optymalizacja infrastrukturyPlnog 3: Zbigniew Skurczyński -  Wirtualizacja i optymalizacja infrastruktury
Plnog 3: Zbigniew Skurczyński - Wirtualizacja i optymalizacja infrastrukturyPROIDEA
 
BIG-IP ADCs and ADF
BIG-IP ADCs and ADFBIG-IP ADCs and ADF
BIG-IP ADCs and ADFF5 Networks
 
Intel and IP Infusion Deliver Deterministic NFV Performance
Intel and IP Infusion Deliver Deterministic NFV PerformanceIntel and IP Infusion Deliver Deterministic NFV Performance
Intel and IP Infusion Deliver Deterministic NFV PerformanceDhiman Chowdhury
 
Ds nsa series_us_10_april10
Ds nsa series_us_10_april10Ds nsa series_us_10_april10
Ds nsa series_us_10_april10Yustinus Malawau
 
Sophos Wireless Protection Overview
Sophos Wireless Protection OverviewSophos Wireless Protection Overview
Sophos Wireless Protection OverviewSophos
 
The DNS of Things
The DNS of ThingsThe DNS of Things
The DNS of ThingsPeter Silva
 
DSS ITSEC 2012 ForeScout Technical RIGA
DSS ITSEC 2012 ForeScout Technical RIGADSS ITSEC 2012 ForeScout Technical RIGA
DSS ITSEC 2012 ForeScout Technical RIGAAndris Soroka
 
F5 Networks Intelligent DNS Scale
F5 Networks Intelligent DNS ScaleF5 Networks Intelligent DNS Scale
F5 Networks Intelligent DNS ScaleF5 Networks
 
Interop 2006: Evolution of the Networking Industry
Interop 2006: Evolution of the Networking IndustryInterop 2006: Evolution of the Networking Industry
Interop 2006: Evolution of the Networking IndustryAbner Germanow
 

Tendances (20)

Fore scout nac-datasheet
Fore scout nac-datasheetFore scout nac-datasheet
Fore scout nac-datasheet
 
Is the Network Tap Mightier Than the Sword
Is the Network Tap Mightier Than the SwordIs the Network Tap Mightier Than the Sword
Is the Network Tap Mightier Than the Sword
 
Thinking about SDN and whether it is the right approach for your organization?
Thinking about SDN and whether it is the right approach for your organization?Thinking about SDN and whether it is the right approach for your organization?
Thinking about SDN and whether it is the right approach for your organization?
 
Dell sonicwall connected security
Dell sonicwall connected securityDell sonicwall connected security
Dell sonicwall connected security
 
Ngfw overview
Ngfw overviewNgfw overview
Ngfw overview
 
Netflow analyzer- Datasheet
Netflow analyzer- DatasheetNetflow analyzer- Datasheet
Netflow analyzer- Datasheet
 
F5 beyond load balancer (nov 2009)
F5 beyond load balancer (nov 2009)F5 beyond load balancer (nov 2009)
F5 beyond load balancer (nov 2009)
 
AGILE SECURITY™ Security for the Real World
AGILE SECURITY™ Security for the Real WorldAGILE SECURITY™ Security for the Real World
AGILE SECURITY™ Security for the Real World
 
S series presentation
S series presentationS series presentation
S series presentation
 
Kerio Control 7 Overview
Kerio Control 7 OverviewKerio Control 7 Overview
Kerio Control 7 Overview
 
Plnog 3: Zbigniew Skurczyński - Wirtualizacja i optymalizacja infrastruktury
Plnog 3: Zbigniew Skurczyński -  Wirtualizacja i optymalizacja infrastrukturyPlnog 3: Zbigniew Skurczyński -  Wirtualizacja i optymalizacja infrastruktury
Plnog 3: Zbigniew Skurczyński - Wirtualizacja i optymalizacja infrastruktury
 
BIG-IP ADCs and ADF
BIG-IP ADCs and ADFBIG-IP ADCs and ADF
BIG-IP ADCs and ADF
 
Intel and IP Infusion Deliver Deterministic NFV Performance
Intel and IP Infusion Deliver Deterministic NFV PerformanceIntel and IP Infusion Deliver Deterministic NFV Performance
Intel and IP Infusion Deliver Deterministic NFV Performance
 
Ds nsa series_us_10_april10
Ds nsa series_us_10_april10Ds nsa series_us_10_april10
Ds nsa series_us_10_april10
 
Sophos Wireless Protection Overview
Sophos Wireless Protection OverviewSophos Wireless Protection Overview
Sophos Wireless Protection Overview
 
The DNS of Things
The DNS of ThingsThe DNS of Things
The DNS of Things
 
DSS ITSEC 2012 ForeScout Technical RIGA
DSS ITSEC 2012 ForeScout Technical RIGADSS ITSEC 2012 ForeScout Technical RIGA
DSS ITSEC 2012 ForeScout Technical RIGA
 
F5 Networks Intelligent DNS Scale
F5 Networks Intelligent DNS ScaleF5 Networks Intelligent DNS Scale
F5 Networks Intelligent DNS Scale
 
MMPL corporate overview mail
MMPL corporate overview mailMMPL corporate overview mail
MMPL corporate overview mail
 
Interop 2006: Evolution of the Networking Industry
Interop 2006: Evolution of the Networking IndustryInterop 2006: Evolution of the Networking Industry
Interop 2006: Evolution of the Networking Industry
 

Similaire à Breakingpoint Application Threat and Intelligence (ATI) Program

BreakingPoint Cloud and Virtualization Data Sheet
BreakingPoint Cloud and Virtualization Data SheetBreakingPoint Cloud and Virtualization Data Sheet
BreakingPoint Cloud and Virtualization Data SheetIxia
 
BreakingPoint Resiliency Score Data Sheet
BreakingPoint Resiliency Score Data SheetBreakingPoint Resiliency Score Data Sheet
BreakingPoint Resiliency Score Data SheetIxia
 
BreakingPoint Storm CTM Cost-Effective Testing Solution
BreakingPoint Storm CTM Cost-Effective Testing SolutionBreakingPoint Storm CTM Cost-Effective Testing Solution
BreakingPoint Storm CTM Cost-Effective Testing SolutionIxia
 
Security Coverage Product Overview
Security Coverage Product OverviewSecurity Coverage Product Overview
Security Coverage Product OverviewOnvoy
 
Karim Maalouf I.T services 2013
Karim Maalouf I.T services 2013Karim Maalouf I.T services 2013
Karim Maalouf I.T services 2013Karim Maalouf
 
Connected Office 3.0
Connected Office 3.0Connected Office 3.0
Connected Office 3.0ddcatfan1
 
Jenniffer Davis Current Resume Tampa FL
Jenniffer Davis Current Resume Tampa FLJenniffer Davis Current Resume Tampa FL
Jenniffer Davis Current Resume Tampa FLJenniffer Davis
 
LTE Testing
LTE TestingLTE Testing
LTE TestingIxia
 
IBM Subscription and Support 2016
IBM Subscription and Support 2016IBM Subscription and Support 2016
IBM Subscription and Support 2016Virginia Fernandez
 
Senior software software engineer
Senior software software engineerSenior software software engineer
Senior software software engineerMark Long
 
Protech Profile Ppt
Protech Profile PptProtech Profile Ppt
Protech Profile PptSujit Amin
 
Michael L Sawall Tier II Tech
Michael L Sawall Tier II TechMichael L Sawall Tier II Tech
Michael L Sawall Tier II TechMike Sawall
 
Utilities: TDM to IP
Utilities:  TDM to IPUtilities:  TDM to IP
Utilities: TDM to IPAvtec Inc.
 
Transtec360 brochure
Transtec360 brochureTranstec360 brochure
Transtec360 brochureTTEC
 

Similaire à Breakingpoint Application Threat and Intelligence (ATI) Program (20)

BreakingPoint Cloud and Virtualization Data Sheet
BreakingPoint Cloud and Virtualization Data SheetBreakingPoint Cloud and Virtualization Data Sheet
BreakingPoint Cloud and Virtualization Data Sheet
 
BreakingPoint Resiliency Score Data Sheet
BreakingPoint Resiliency Score Data SheetBreakingPoint Resiliency Score Data Sheet
BreakingPoint Resiliency Score Data Sheet
 
BreakingPoint Storm CTM Cost-Effective Testing Solution
BreakingPoint Storm CTM Cost-Effective Testing SolutionBreakingPoint Storm CTM Cost-Effective Testing Solution
BreakingPoint Storm CTM Cost-Effective Testing Solution
 
Security Coverage Product Overview
Security Coverage Product OverviewSecurity Coverage Product Overview
Security Coverage Product Overview
 
Smsmse6.5 exchange2007 2010
Smsmse6.5 exchange2007 2010Smsmse6.5 exchange2007 2010
Smsmse6.5 exchange2007 2010
 
Karim Maalouf I.T services 2013
Karim Maalouf I.T services 2013Karim Maalouf I.T services 2013
Karim Maalouf I.T services 2013
 
Desktop Services
Desktop ServicesDesktop Services
Desktop Services
 
Connected Office 3.0
Connected Office 3.0Connected Office 3.0
Connected Office 3.0
 
Jenniffer Davis Current Resume Tampa FL
Jenniffer Davis Current Resume Tampa FLJenniffer Davis Current Resume Tampa FL
Jenniffer Davis Current Resume Tampa FL
 
LTE Testing
LTE TestingLTE Testing
LTE Testing
 
IBM Subscription and Support 2016
IBM Subscription and Support 2016IBM Subscription and Support 2016
IBM Subscription and Support 2016
 
IBM Subscription and Support - English
IBM Subscription and Support - EnglishIBM Subscription and Support - English
IBM Subscription and Support - English
 
Senior software software engineer
Senior software software engineerSenior software software engineer
Senior software software engineer
 
Protech Profile Ppt
Protech Profile PptProtech Profile Ppt
Protech Profile Ppt
 
resume 2015 update
resume 2015 updateresume 2015 update
resume 2015 update
 
Michael L Sawall Tier II Tech
Michael L Sawall Tier II TechMichael L Sawall Tier II Tech
Michael L Sawall Tier II Tech
 
RussellMannResume
RussellMannResumeRussellMannResume
RussellMannResume
 
Utilities: TDM to IP
Utilities:  TDM to IPUtilities:  TDM to IP
Utilities: TDM to IP
 
Transtec360 brochure
Transtec360 brochureTranstec360 brochure
Transtec360 brochure
 
RobertaSalinas2015
RobertaSalinas2015RobertaSalinas2015
RobertaSalinas2015
 

Plus de Ixia

Measuring Private Cloud Resiliency
Measuring Private Cloud ResiliencyMeasuring Private Cloud Resiliency
Measuring Private Cloud ResiliencyIxia
 
LTE Testing | 4G Testing
LTE Testing | 4G TestingLTE Testing | 4G Testing
LTE Testing | 4G TestingIxia
 
White Paper: Six-Step Competitive Device Evaluation
White Paper: Six-Step Competitive Device EvaluationWhite Paper: Six-Step Competitive Device Evaluation
White Paper: Six-Step Competitive Device EvaluationIxia
 
IPS Test Methodology
IPS Test MethodologyIPS Test Methodology
IPS Test MethodologyIxia
 
Deep Packet Inspection (DPI) Test Methodology
Deep Packet Inspection (DPI) Test MethodologyDeep Packet Inspection (DPI) Test Methodology
Deep Packet Inspection (DPI) Test MethodologyIxia
 
Load Test Methodology: Server Load Testing
Load Test Methodology: Server Load TestingLoad Test Methodology: Server Load Testing
Load Test Methodology: Server Load TestingIxia
 
IPv6 Test Methodology
IPv6 Test MethodologyIPv6 Test Methodology
IPv6 Test MethodologyIxia
 
Server Load Balancer Test Methodology
Server Load Balancer Test MethodologyServer Load Balancer Test Methodology
Server Load Balancer Test MethodologyIxia
 
How to Test High-Performance Next-Generation Firewalls
How to Test High-Performance Next-Generation FirewallsHow to Test High-Performance Next-Generation Firewalls
How to Test High-Performance Next-Generation FirewallsIxia
 
Catalyst 6500 ASA Service Module
Catalyst 6500 ASA Service ModuleCatalyst 6500 ASA Service Module
Catalyst 6500 ASA Service ModuleIxia
 
Testing High Performance Firewalls
Testing High Performance FirewallsTesting High Performance Firewalls
Testing High Performance FirewallsIxia
 
BreakingPoint & Fortinet RSA Conference 2011 Presentation: Evaluating Enterpr...
BreakingPoint & Fortinet RSA Conference 2011 Presentation: Evaluating Enterpr...BreakingPoint & Fortinet RSA Conference 2011 Presentation: Evaluating Enterpr...
BreakingPoint & Fortinet RSA Conference 2011 Presentation: Evaluating Enterpr...Ixia
 
BreakingPoint & Juniper RSA Conference 2011 Presentation: Securing the High P...
BreakingPoint & Juniper RSA Conference 2011 Presentation: Securing the High P...BreakingPoint & Juniper RSA Conference 2011 Presentation: Securing the High P...
BreakingPoint & Juniper RSA Conference 2011 Presentation: Securing the High P...Ixia
 
BreakingPoint & Stonesoft RSA Conference 2011 Presentation: Evaluating IPS
BreakingPoint & Stonesoft RSA Conference 2011 Presentation: Evaluating IPSBreakingPoint & Stonesoft RSA Conference 2011 Presentation: Evaluating IPS
BreakingPoint & Stonesoft RSA Conference 2011 Presentation: Evaluating IPSIxia
 
BreakingPoint & Juniper RSA Conference 2011 Presentation: Evaluating The Juni...
BreakingPoint & Juniper RSA Conference 2011 Presentation: Evaluating The Juni...BreakingPoint & Juniper RSA Conference 2011 Presentation: Evaluating The Juni...
BreakingPoint & Juniper RSA Conference 2011 Presentation: Evaluating The Juni...Ixia
 
BreakingPoint & Crossbeam RSA Conference 2011 Presentation: Evaluating High P...
BreakingPoint & Crossbeam RSA Conference 2011 Presentation: Evaluating High P...BreakingPoint & Crossbeam RSA Conference 2011 Presentation: Evaluating High P...
BreakingPoint & Crossbeam RSA Conference 2011 Presentation: Evaluating High P...Ixia
 
BreakingPoint & McAfee RSA Conference 2011 Presentation: Data Sheets Lie
BreakingPoint & McAfee RSA Conference 2011 Presentation: Data Sheets LieBreakingPoint & McAfee RSA Conference 2011 Presentation: Data Sheets Lie
BreakingPoint & McAfee RSA Conference 2011 Presentation: Data Sheets LieIxia
 
Cybersecurity: Arm and Train US Warriors to Win Cyber War
Cybersecurity: Arm and Train US Warriors to Win Cyber WarCybersecurity: Arm and Train US Warriors to Win Cyber War
Cybersecurity: Arm and Train US Warriors to Win Cyber WarIxia
 
Firewall Testing Methodology
Firewall Testing MethodologyFirewall Testing Methodology
Firewall Testing MethodologyIxia
 
Measure Network Performance, Security and Stability
Measure Network Performance, Security and StabilityMeasure Network Performance, Security and Stability
Measure Network Performance, Security and StabilityIxia
 

Plus de Ixia (20)

Measuring Private Cloud Resiliency
Measuring Private Cloud ResiliencyMeasuring Private Cloud Resiliency
Measuring Private Cloud Resiliency
 
LTE Testing | 4G Testing
LTE Testing | 4G TestingLTE Testing | 4G Testing
LTE Testing | 4G Testing
 
White Paper: Six-Step Competitive Device Evaluation
White Paper: Six-Step Competitive Device EvaluationWhite Paper: Six-Step Competitive Device Evaluation
White Paper: Six-Step Competitive Device Evaluation
 
IPS Test Methodology
IPS Test MethodologyIPS Test Methodology
IPS Test Methodology
 
Deep Packet Inspection (DPI) Test Methodology
Deep Packet Inspection (DPI) Test MethodologyDeep Packet Inspection (DPI) Test Methodology
Deep Packet Inspection (DPI) Test Methodology
 
Load Test Methodology: Server Load Testing
Load Test Methodology: Server Load TestingLoad Test Methodology: Server Load Testing
Load Test Methodology: Server Load Testing
 
IPv6 Test Methodology
IPv6 Test MethodologyIPv6 Test Methodology
IPv6 Test Methodology
 
Server Load Balancer Test Methodology
Server Load Balancer Test MethodologyServer Load Balancer Test Methodology
Server Load Balancer Test Methodology
 
How to Test High-Performance Next-Generation Firewalls
How to Test High-Performance Next-Generation FirewallsHow to Test High-Performance Next-Generation Firewalls
How to Test High-Performance Next-Generation Firewalls
 
Catalyst 6500 ASA Service Module
Catalyst 6500 ASA Service ModuleCatalyst 6500 ASA Service Module
Catalyst 6500 ASA Service Module
 
Testing High Performance Firewalls
Testing High Performance FirewallsTesting High Performance Firewalls
Testing High Performance Firewalls
 
BreakingPoint & Fortinet RSA Conference 2011 Presentation: Evaluating Enterpr...
BreakingPoint & Fortinet RSA Conference 2011 Presentation: Evaluating Enterpr...BreakingPoint & Fortinet RSA Conference 2011 Presentation: Evaluating Enterpr...
BreakingPoint & Fortinet RSA Conference 2011 Presentation: Evaluating Enterpr...
 
BreakingPoint & Juniper RSA Conference 2011 Presentation: Securing the High P...
BreakingPoint & Juniper RSA Conference 2011 Presentation: Securing the High P...BreakingPoint & Juniper RSA Conference 2011 Presentation: Securing the High P...
BreakingPoint & Juniper RSA Conference 2011 Presentation: Securing the High P...
 
BreakingPoint & Stonesoft RSA Conference 2011 Presentation: Evaluating IPS
BreakingPoint & Stonesoft RSA Conference 2011 Presentation: Evaluating IPSBreakingPoint & Stonesoft RSA Conference 2011 Presentation: Evaluating IPS
BreakingPoint & Stonesoft RSA Conference 2011 Presentation: Evaluating IPS
 
BreakingPoint & Juniper RSA Conference 2011 Presentation: Evaluating The Juni...
BreakingPoint & Juniper RSA Conference 2011 Presentation: Evaluating The Juni...BreakingPoint & Juniper RSA Conference 2011 Presentation: Evaluating The Juni...
BreakingPoint & Juniper RSA Conference 2011 Presentation: Evaluating The Juni...
 
BreakingPoint & Crossbeam RSA Conference 2011 Presentation: Evaluating High P...
BreakingPoint & Crossbeam RSA Conference 2011 Presentation: Evaluating High P...BreakingPoint & Crossbeam RSA Conference 2011 Presentation: Evaluating High P...
BreakingPoint & Crossbeam RSA Conference 2011 Presentation: Evaluating High P...
 
BreakingPoint & McAfee RSA Conference 2011 Presentation: Data Sheets Lie
BreakingPoint & McAfee RSA Conference 2011 Presentation: Data Sheets LieBreakingPoint & McAfee RSA Conference 2011 Presentation: Data Sheets Lie
BreakingPoint & McAfee RSA Conference 2011 Presentation: Data Sheets Lie
 
Cybersecurity: Arm and Train US Warriors to Win Cyber War
Cybersecurity: Arm and Train US Warriors to Win Cyber WarCybersecurity: Arm and Train US Warriors to Win Cyber War
Cybersecurity: Arm and Train US Warriors to Win Cyber War
 
Firewall Testing Methodology
Firewall Testing MethodologyFirewall Testing Methodology
Firewall Testing Methodology
 
Measure Network Performance, Security and Stability
Measure Network Performance, Security and StabilityMeasure Network Performance, Security and Stability
Measure Network Performance, Security and Stability
 

Dernier

TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesThousandEyes
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Farhan Tariq
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...Wes McKinney
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality AssuranceInflectra
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Strongerpanagenda
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Scott Andery
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterMydbops
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfpanagenda
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI AgeCprime
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Hiroshi SHIBATA
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 

Dernier (20)

TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL Router
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI Age
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 

Breakingpoint Application Threat and Intelligence (ATI) Program

  • 1. BreakingPoint Application and Threat Intelligence Program BreakingPoint Application and Threat Intelligence (ATI) Program A comprehensive service and support program for optimizing and hardening the resiliency of IT infrastructures that includes product updates, authentic application protocols, real-world security attacks, and responsive support BreakingPoint Cyber Tomography Machine™ (CTM) products expose The BreakingPoint ATI Program includes: previously impossible-to-detect vulnerabilities and weaknesses in • All software updates and enhancements applications, devices, networks, and data centers before they can • Frequent application protocol releases to library of adversely affect IT operations. 150+ applications Every BreakingPoint CTM is designed for speed, realism, and ease • Research into emerging security vulnerabilities of use. A key aspect of the design is the BreakingPoint Application • Frequent security updates to library of 4,500+ security and Threat Intelligence (ATI) Program, a responsive and all-inclusive attacks, 100+ evasion techniques, and 28,000+ pieces of service and support program. Our team of dedicated application live malware, including mobile malware and security researchers provides everything you need for thorough • Microsoft® Tuesday updates within 24 hours measurement of the performance, security, and stability of IT • Priority access to problem resolution team infrastructures, including access to all application protocols, security • Personalized service and support attacks, product enhancements, and full service and support. In • Single point of contact for problem resolution one comprehensive program, you can tap into the resources and • Convenient technical support options expertise you need to keep your simulations current and realistic. • Community and educational resources The ATI Program includes all of the following: Frequent Application Protocol Updates and Data Loss Prevention (DLP) products. These are the Evergreen With a current ATI Program agreement, you are assured of the Application Protocols supported: most realistic simulation conditions possible with access to the • AOL Messaging latest applications. The BreakingPoint ATI team uses advanced • AOL Webmail surveillance techniques and methodologies to identify, capture, • Google Mail (Gmail) and rapidly deliver the emergent business, consumer, and malicious • Google Talk applications you need to conduct meaningful and thorough • ICQ performance and security validation. • Jabber (XMPP) • MSN Messaging Consistent with BreakingPoint’s all-inclusive approach, your ATI • Windows Live Mail Program account gives you automatic access to all newly released protocols, software fixes, operating system updates, and other • Yahoo! Mail resource downloads. • Yahoo! Messaging Evergreen Application Protocols Updates from the Industry’s Top Security Researchers Content-aware network and security devices are at a severe Security threats are constantly evolving, with new vulnerabilities disadvantage if they are not tested using the most current versions discovered each day. Your simulation conditions must reflect the latest of the most popular application protocols. The BreakingPoint security threats so that you can ensure your equipment will perform Evergreen Applications program addresses this need by providing reliably and protect your infrastructure from the most advanced and ever-current versions of popular Web and network applications malicious traffic. Our team of experts does the research for you by for validating deep packet inspection (DPI), Lawful Intercept (LI), identifying and generating security attacks that meet your needs.
  • 2. BreakingPoint Application and Threat Intelligence Program We don’t license our security attacks from other vendors: Our award- Warranty Provisions/Extended Hardware Options winning staff of application and security researchers provides timely BreakingPoint provides a one (1) year standard hardware warranty updates, ensuring we deliver the industry’s most complete security or an optional extended hardware warranty. Please contact updates. Currently we provide: your sales representative or an authorized reseller for additional • 4,500+ security strikes and 100+ evasion techniques information on extended hardware warranty options. • 28,000+ pieces of live malware, including mobile malware, which can be launched through multiple transports, including More Information HTTP, SMTP, POP, and IMAP, and embedded within popular file Custom ATI Program packages are available for site licenses types such as .doc, .pdf, .ppt, and .xls and multi-year programs. For more information about how the • The industry’s most comprehensive Microsoft® Tuesday BreakingPoint ATI Program can help you harden your IT infrastructure, coverage, with 24-hour response time please contact your regional sales representative today. • SYN flood attacks with more than 1million connections per second Contact BreakingPoint • The ability to direct attacks at networking devices or target servers Learn more about BreakingPoint products and services by • Application layer fuzzing to detect previously unknown contacting a representative in your area. vulnerabilities 1.866.352.6691 U.S. Toll Free www.breakingpoint.com Convenient Technical Support Options BreakingPoint offers a range of responsive support options to ATI BreakingPoint Global Headquarters Program customers. You can get answers to questions and requests, 3900 North Capital of Texas Highway including phone-based, email, and online support. Experienced Austin, TX 78746 technical representatives are available Monday through Friday, email: salesinfo@breakingpoint.com 7:00 am – 7:00 pm central time. Or you can bypass phone support tel: 512.821.6000 and submit your service requests online. Open a new request or toll free: 866.352.6691 update and check the status of existing requests via email at your convenience. BreakingPoint EMEA Sales Paris, France Authorized Technical Support Contacts email: emea_sales@breakingpoint.com As an ATI Program customer, you may designate people within your tel: + 33 6 08 40 43 93 organization who are authorized to submit an unlimited number of service requests to our support technicians. If desired, BreakingPoint will designate a support specialist to serve as your single point of BreakingPoint APAC Sales contact for requests. This expert will become familiar with your Suite 2901, Building #5, Wanda Plaza environment and facilitate the delivery of solutions that meet your No. 93 Jianguo Road needs. Chaoyang District, Beijing, 100022, China email: apac_sales@breakingpoint.com Professional Services Engagements tel: + 86 10 5960 3162 ATI Program customers have free access to all Web-based tutorials and may also purchase on-site technical training. Our expert consultants are available on a contract basis to review your simulation and measurement plans and ensure that they are current, rigorous, and comprehensive. Our Professional Services staff can also visit your site to address your most pressing issues and questions or oversee critical projects. www.breakingpoint.com © 2005 – 2011. BreakingPoint Systems, Inc. All rights reserved. The BreakingPoint logo is a trademark of BreakingPoint Systems, Inc. All other trademarks are the property of their respective owners.