Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Breakingpoint Application Threat and Intelligence (ATI) Program
1. BreakingPoint Application and Threat Intelligence Program
BreakingPoint Application and Threat Intelligence
(ATI) Program
A comprehensive service and support program for optimizing and hardening the resiliency of IT
infrastructures that includes product updates, authentic application protocols, real-world security attacks,
and responsive support
BreakingPoint Cyber Tomography Machine™ (CTM) products expose
The BreakingPoint ATI Program includes:
previously impossible-to-detect vulnerabilities and weaknesses in
• All software updates and enhancements
applications, devices, networks, and data centers before they can
• Frequent application protocol releases to library of
adversely affect IT operations.
150+ applications
Every BreakingPoint CTM is designed for speed, realism, and ease • Research into emerging security vulnerabilities
of use. A key aspect of the design is the BreakingPoint Application • Frequent security updates to library of 4,500+ security
and Threat Intelligence (ATI) Program, a responsive and all-inclusive attacks, 100+ evasion techniques, and 28,000+ pieces of
service and support program. Our team of dedicated application live malware, including mobile malware
and security researchers provides everything you need for thorough • Microsoft® Tuesday updates within 24 hours
measurement of the performance, security, and stability of IT • Priority access to problem resolution team
infrastructures, including access to all application protocols, security • Personalized service and support
attacks, product enhancements, and full service and support. In • Single point of contact for problem resolution
one comprehensive program, you can tap into the resources and • Convenient technical support options
expertise you need to keep your simulations current and realistic. • Community and educational resources
The ATI Program includes all of the following:
Frequent Application Protocol Updates and Data Loss Prevention (DLP) products. These are the Evergreen
With a current ATI Program agreement, you are assured of the Application Protocols supported:
most realistic simulation conditions possible with access to the • AOL Messaging
latest applications. The BreakingPoint ATI team uses advanced • AOL Webmail
surveillance techniques and methodologies to identify, capture, • Google Mail (Gmail)
and rapidly deliver the emergent business, consumer, and malicious • Google Talk
applications you need to conduct meaningful and thorough • ICQ
performance and security validation.
• Jabber (XMPP)
• MSN Messaging
Consistent with BreakingPoint’s all-inclusive approach, your ATI
• Windows Live Mail
Program account gives you automatic access to all newly released
protocols, software fixes, operating system updates, and other • Yahoo! Mail
resource downloads. • Yahoo! Messaging
Evergreen Application Protocols Updates from the Industry’s Top Security Researchers
Content-aware network and security devices are at a severe Security threats are constantly evolving, with new vulnerabilities
disadvantage if they are not tested using the most current versions discovered each day. Your simulation conditions must reflect the latest
of the most popular application protocols. The BreakingPoint security threats so that you can ensure your equipment will perform
Evergreen Applications program addresses this need by providing reliably and protect your infrastructure from the most advanced and
ever-current versions of popular Web and network applications malicious traffic. Our team of experts does the research for you by
for validating deep packet inspection (DPI), Lawful Intercept (LI), identifying and generating security attacks that meet your needs.