SlideShare une entreprise Scribd logo
1  sur  2
Télécharger pour lire hors ligne
BreakingPoint 3G Data Sheet




Test 3G Network Performance, Security, and
Stability at Massive Scale
BreakingPoint CTM™ Products Emulate Millions of Users to Reduce Cost and Complexity of Validating 3G
Wireless Infrastructure


Telecom carriers dealing with the rapidly growing 3G user base              With a BreakingPoint CTM you can:
must test mobile infrastructures efficiently and accurately under
                                                                               • Measure and harden the performance, security, and stability
punishing real-world conditions, without spending a fortune to do
                                                                                 of load balancers, firewalls, IPS devices, and other equipment
so. BreakingPoint CTM products go far beyond the simple functional
                                                                                 with up to 120 gigabits per second of application, attack, and
testing of current 3G validation tools by emulating millions of pieces
                                                                                 malformed traffic.
of user equipment (UE) while transmitting real-world application
                                                                               • Validate network and data center performance by recreating
traffic and security attacks.
                                                                                 more than 150 application protocols, including Twitter Mobile,
BreakingPoint products allow carriers and equipment                              AOL® IM, Yahoo!® Mail and Messenger, Google® Gmail, Skype®,
manufacturers to test 3G networks and devices against the behavior               BitTorrent™, eDonkey, RADIUS, SIP, RTSP, RTP, HTTP, SSL,
of millions of users streaming video, placing calls, purchasing music,           Facebook®, YouTube®, and Apple® FaceTime®, as well as other
or unknowingly sharing the latest malware. A BreakingPoint CTM                   mobile, social, and gaming protocols—with multicast support.
replaces racks of equipment and complicated setup processes with               • Stress network infrastructures with more than 4,500 security
a single-chassis device and a single user interface.                             attacks and 28,000 pieces of malware—including more
                                                                                 than 100 pieces of mobile malware—plus obfuscations and
Unprecedented Performance and Massive Scale in a Cost-
                                                                                 evasions.
Effective Device
                                                                               • Find network problem areas sooner and prepare for the
Based on a patented breakthrough in network processor
                                                                                 unexpected with the industry’s fastest protocol fuzzing
technology and backed by a team of network performance and
                                                                                 capabilities.
security experts, only a BreakingPoint CTM produces the city-scale
3G network conditions needed to harden carrier-grade network                   • Emulate sophisticated, large-scale DDoS and mobile-initiated
resiliency.                                                                      botnet attacks to uncover previously hidden weaknesses.




              For 3G GTP encapsulation, BreakingPoint emulates all elements in this diagram concurrently, or GGSN or SGSN in isolation.
BreakingPoint 3G Data Sheet


  The Solution for Simulating Multi-Million-User 3G Networks,
  with Additional 4G/LTE Capability
  The unique architecture of BreakingPoint CTM products delivers the
  huge performance numbers necessary to validate and harden even
  the largest 3G networks under the most realistic conditions, all from
  a turnkey solution, including:

     • Up to 90 million concurrent TCP sessions, allowing emulation
         of millions of UEs such as smartphones, tablet computers, and
         netbooks.
     • Interactions among the key network elements involved in
         3G communications, including serving GPRS support nodes                               BreakingPoint FireStorm CTM Specifications
         (SGSNs) and gateway GPRS support nodes (GGSNs).                                       A single BreakingPoint FireStorm CTM provides the equivalent
     • A full Dynamic Host Control Protocol (DHCP) network, with                               performance of many racks of servers from a 4U chassis, including:
         support for both DHCP Client and DHCP Server processes.                                   • 120 gigabits per second of blended stateful application traffic
     • Support for both 3G and LTE environments with GTPv1 and                                     • 90 million concurrent TCP sessions
         GTPv2.                                                                                    • 4 million TCP sessions per second

  Technological Breakthroughs from an Easy-to-Use Product                                          • 1.5 million steady-state complete TCP sessions per second
  That Is Always Current                                                                           • 120,000+ SSL sessions per second
  BreakingPoint CTMs are designed for ease of use and rapid                                        • 150+ stateful application protocols
  configuration in a variety of network environments. Because of their                             • 4,500+ live security attacks
  exclusive design, they evolve along with the frequent changes in
                                                                                                   • 28,000+ pieces of malware
  the landscape for applications, attacks, and telecom standards. With
                                                                                                   • 1 Gigabit Ethernet and 10 Gigabit Ethernet interfaces
  a BreakingPoint CTM, you will:
                                                                                               To learn more about all BreakingPoint products and services, visit
     • Receive frequent updates from the BreakingPoint Application                             www.breakingpoint.com/products.
         and Threat Intelligence (ATI) research team, which is dedicated
         to keeping applications and attacks current and providing                             Schedule a Demonstration Today
         frequent feature and performance enhancements.                                        Find out why the world’s largest service providers rely on
     • Employ built-in network traffic profiles—created using                                  BreakingPoint to measure and harden the resiliency of every
         data collected from top global telecom carriers—or easily                             component of their 3G infrastructures. Visit
         customize these profiles to fit your own network’s unique                             www.breakingpoint.com/3G.
         conditions.
                                                                                               1.866.352.6691 U.S. Toll-Free
     • Configure simulations in just minutes through a single user-                            www.breakingpoint.com
         friendly interface that features fully integrated reporting, even
         across multiple BreakingPoint CTMs.
     • Leverage extensive automation and wizard-like labs that
         address many use-case scenarios, including validation of
         Lawful Intercept and data loss prevention (DLP) solutions with
         a digital storm of content in multiple languages.
  Eliminate the complexity of conventional testing approaches
  and replace it with the simplicity, power, and precision of the
  BreakingPoint CTM.




www.breakingpoint.com
© 2005 - 2011. BreakingPoint Systems, Inc. All rights reserved. The BreakingPoint logo is a trademark of BreakingPoint Systems, Inc.
All other trademarks are the property of their respective owners.

Contenu connexe

Tendances

Kerio Control 7 Overview
Kerio Control 7 OverviewKerio Control 7 Overview
Kerio Control 7 Overview
rkoscak
 
Is the Network Tap Mightier Than the Sword
Is the Network Tap Mightier Than the SwordIs the Network Tap Mightier Than the Sword
Is the Network Tap Mightier Than the Sword
LiveAction Next Generation Network Management Software
 
Data Sheet: OpenDNS Enterprise Insights
Data Sheet: OpenDNS Enterprise InsightsData Sheet: OpenDNS Enterprise Insights
Data Sheet: OpenDNS Enterprise Insights
Courtland Smith
 
AGILE SECURITY™ Security for the Real World
AGILE SECURITY™ Security for the Real WorldAGILE SECURITY™ Security for the Real World
AGILE SECURITY™ Security for the Real World
Cisco Russia
 
Consider Sophos - Security Made Simple
Consider Sophos - Security Made SimpleConsider Sophos - Security Made Simple
Consider Sophos - Security Made Simple
David Fuchs
 

Tendances (20)

Air defense ap_test_spec_sheet
Air defense ap_test_spec_sheetAir defense ap_test_spec_sheet
Air defense ap_test_spec_sheet
 
Checkpoint Overview
Checkpoint OverviewCheckpoint Overview
Checkpoint Overview
 
Kerio Control 7 Overview
Kerio Control 7 OverviewKerio Control 7 Overview
Kerio Control 7 Overview
 
BIG-IP Data Center Firewall Solution
BIG-IP Data Center Firewall SolutionBIG-IP Data Center Firewall Solution
BIG-IP Data Center Firewall Solution
 
Mitigating Risk for the Mobile Worker: Novell ZENworks Endpoint Security Mana...
Mitigating Risk for the Mobile Worker: Novell ZENworks Endpoint Security Mana...Mitigating Risk for the Mobile Worker: Novell ZENworks Endpoint Security Mana...
Mitigating Risk for the Mobile Worker: Novell ZENworks Endpoint Security Mana...
 
Ngfw overview
Ngfw overviewNgfw overview
Ngfw overview
 
Symantec Endpoint Suite
Symantec Endpoint SuiteSymantec Endpoint Suite
Symantec Endpoint Suite
 
Fore scout nac-datasheet
Fore scout nac-datasheetFore scout nac-datasheet
Fore scout nac-datasheet
 
Dell sonicwall connected security
Dell sonicwall connected securityDell sonicwall connected security
Dell sonicwall connected security
 
The ROI for Early Testing 120816 (Ixia)
The ROI for Early Testing 120816 (Ixia)The ROI for Early Testing 120816 (Ixia)
The ROI for Early Testing 120816 (Ixia)
 
Is the Network Tap Mightier Than the Sword
Is the Network Tap Mightier Than the SwordIs the Network Tap Mightier Than the Sword
Is the Network Tap Mightier Than the Sword
 
Thinking about SDN and whether it is the right approach for your organization?
Thinking about SDN and whether it is the right approach for your organization?Thinking about SDN and whether it is the right approach for your organization?
Thinking about SDN and whether it is the right approach for your organization?
 
checkpoint
checkpointcheckpoint
checkpoint
 
Data Sheet: OpenDNS Enterprise Insights
Data Sheet: OpenDNS Enterprise InsightsData Sheet: OpenDNS Enterprise Insights
Data Sheet: OpenDNS Enterprise Insights
 
F5 beyond load balancer (nov 2009)
F5 beyond load balancer (nov 2009)F5 beyond load balancer (nov 2009)
F5 beyond load balancer (nov 2009)
 
Netflow analyzer- Datasheet
Netflow analyzer- DatasheetNetflow analyzer- Datasheet
Netflow analyzer- Datasheet
 
AGILE SECURITY™ Security for the Real World
AGILE SECURITY™ Security for the Real WorldAGILE SECURITY™ Security for the Real World
AGILE SECURITY™ Security for the Real World
 
Intelligent DNS Scale
Intelligent DNS ScaleIntelligent DNS Scale
Intelligent DNS Scale
 
Consider Sophos - Security Made Simple
Consider Sophos - Security Made SimpleConsider Sophos - Security Made Simple
Consider Sophos - Security Made Simple
 
Symantec Virtualization Launch VMworld 2012
Symantec Virtualization Launch VMworld 2012Symantec Virtualization Launch VMworld 2012
Symantec Virtualization Launch VMworld 2012
 

Similaire à BreakingPoint 3G Testing Data Sheet

BreakingPoint Resiliency Score Data Sheet
BreakingPoint Resiliency Score Data SheetBreakingPoint Resiliency Score Data Sheet
BreakingPoint Resiliency Score Data Sheet
Ixia
 
Transforming Private 5G Networks
Transforming Private 5G NetworksTransforming Private 5G Networks
Transforming Private 5G Networks
inside-BigData.com
 
SoftLayer & Ingram Micro: A Winning Combination for Partners
SoftLayer & Ingram Micro: A Winning Combination for PartnersSoftLayer & Ingram Micro: A Winning Combination for Partners
SoftLayer & Ingram Micro: A Winning Combination for Partners
Ingram Micro Cloud
 
Acceleration_and_Security_draft_v2
Acceleration_and_Security_draft_v2Acceleration_and_Security_draft_v2
Acceleration_and_Security_draft_v2
Srinivasa Addepalli
 
How Network Instruments can help you!
How Network Instruments can help you!How Network Instruments can help you!
How Network Instruments can help you!
Tonya Williams
 

Similaire à BreakingPoint 3G Testing Data Sheet (20)

BreakingPoint Resiliency Score Data Sheet
BreakingPoint Resiliency Score Data SheetBreakingPoint Resiliency Score Data Sheet
BreakingPoint Resiliency Score Data Sheet
 
Zero Trust for Private 5G and Edge
Zero Trust for Private 5G and EdgeZero Trust for Private 5G and Edge
Zero Trust for Private 5G and Edge
 
Transforming Private 5G Networks
Transforming Private 5G NetworksTransforming Private 5G Networks
Transforming Private 5G Networks
 
5G Multi-Access Edge Compute
5G Multi-Access Edge Compute5G Multi-Access Edge Compute
5G Multi-Access Edge Compute
 
Ecom CN70X ATEX Certified Hazardous Area PDA (Mobile Computer) Datasheet
Ecom CN70X ATEX Certified Hazardous Area PDA (Mobile Computer) DatasheetEcom CN70X ATEX Certified Hazardous Area PDA (Mobile Computer) Datasheet
Ecom CN70X ATEX Certified Hazardous Area PDA (Mobile Computer) Datasheet
 
BreakingPoint от Ixia
BreakingPoint от IxiaBreakingPoint от Ixia
BreakingPoint от Ixia
 
Re-Imagining the Data Center with Intel
Re-Imagining the Data Center with IntelRe-Imagining the Data Center with Intel
Re-Imagining the Data Center with Intel
 
TechWiseTV Workshop: Cisco Catalyst 9800 Series Wireless Controller
TechWiseTV Workshop: Cisco Catalyst 9800 Series Wireless ControllerTechWiseTV Workshop: Cisco Catalyst 9800 Series Wireless Controller
TechWiseTV Workshop: Cisco Catalyst 9800 Series Wireless Controller
 
SoftLayer & Ingram Micro: A Winning Combination for Partners
SoftLayer & Ingram Micro: A Winning Combination for PartnersSoftLayer & Ingram Micro: A Winning Combination for Partners
SoftLayer & Ingram Micro: A Winning Combination for Partners
 
Acceleration_and_Security_draft_v2
Acceleration_and_Security_draft_v2Acceleration_and_Security_draft_v2
Acceleration_and_Security_draft_v2
 
Mastering IoT Design: Sense, Process, Connect: Processing: Turning IoT Data i...
Mastering IoT Design: Sense, Process, Connect: Processing: Turning IoT Data i...Mastering IoT Design: Sense, Process, Connect: Processing: Turning IoT Data i...
Mastering IoT Design: Sense, Process, Connect: Processing: Turning IoT Data i...
 
Building Efficient Edge Nodes for Content Delivery Networks
Building Efficient Edge Nodes for Content Delivery NetworksBuilding Efficient Edge Nodes for Content Delivery Networks
Building Efficient Edge Nodes for Content Delivery Networks
 
Transformation From Today To Tomorrow - Market and Product Strategy 2018
Transformation From Today To Tomorrow - Market and Product Strategy 2018Transformation From Today To Tomorrow - Market and Product Strategy 2018
Transformation From Today To Tomorrow - Market and Product Strategy 2018
 
Ecom CK7X ATEX Certified Hazardous Area PDA (Mobile Computer) Datasheet
Ecom CK7X ATEX Certified Hazardous Area PDA (Mobile Computer) DatasheetEcom CK7X ATEX Certified Hazardous Area PDA (Mobile Computer) Datasheet
Ecom CK7X ATEX Certified Hazardous Area PDA (Mobile Computer) Datasheet
 
2017 - LISA - LinkedIn's Distributed Firewall (DFW)
2017 - LISA - LinkedIn's Distributed Firewall (DFW)2017 - LISA - LinkedIn's Distributed Firewall (DFW)
2017 - LISA - LinkedIn's Distributed Firewall (DFW)
 
2596 - Integrating PureApplication System Into Your Network
2596 - Integrating PureApplication System Into Your Network2596 - Integrating PureApplication System Into Your Network
2596 - Integrating PureApplication System Into Your Network
 
How Network Instruments can help you!
How Network Instruments can help you!How Network Instruments can help you!
How Network Instruments can help you!
 
Revolutionizing IoT Testing - A Sneak Peek of HiveMQ Swarm
Revolutionizing IoT Testing - A Sneak Peek of HiveMQ SwarmRevolutionizing IoT Testing - A Sneak Peek of HiveMQ Swarm
Revolutionizing IoT Testing - A Sneak Peek of HiveMQ Swarm
 
Network Vision Sprint Direct Connect
Network Vision   Sprint Direct ConnectNetwork Vision   Sprint Direct Connect
Network Vision Sprint Direct Connect
 
VMworld 2013: Network Function Virtualization in the Cloud: Case for Enterpri...
VMworld 2013: Network Function Virtualization in the Cloud: Case for Enterpri...VMworld 2013: Network Function Virtualization in the Cloud: Case for Enterpri...
VMworld 2013: Network Function Virtualization in the Cloud: Case for Enterpri...
 

Plus de Ixia

Measuring Private Cloud Resiliency
Measuring Private Cloud ResiliencyMeasuring Private Cloud Resiliency
Measuring Private Cloud Resiliency
Ixia
 
Load Test Methodology: Server Load Testing
Load Test Methodology: Server Load TestingLoad Test Methodology: Server Load Testing
Load Test Methodology: Server Load Testing
Ixia
 
IPv6 Test Methodology
IPv6 Test MethodologyIPv6 Test Methodology
IPv6 Test Methodology
Ixia
 

Plus de Ixia (20)

Measuring Private Cloud Resiliency
Measuring Private Cloud ResiliencyMeasuring Private Cloud Resiliency
Measuring Private Cloud Resiliency
 
LTE Testing | 4G Testing
LTE Testing | 4G TestingLTE Testing | 4G Testing
LTE Testing | 4G Testing
 
White Paper: Six-Step Competitive Device Evaluation
White Paper: Six-Step Competitive Device EvaluationWhite Paper: Six-Step Competitive Device Evaluation
White Paper: Six-Step Competitive Device Evaluation
 
IPS Test Methodology
IPS Test MethodologyIPS Test Methodology
IPS Test Methodology
 
Deep Packet Inspection (DPI) Test Methodology
Deep Packet Inspection (DPI) Test MethodologyDeep Packet Inspection (DPI) Test Methodology
Deep Packet Inspection (DPI) Test Methodology
 
Load Test Methodology: Server Load Testing
Load Test Methodology: Server Load TestingLoad Test Methodology: Server Load Testing
Load Test Methodology: Server Load Testing
 
IPv6 Test Methodology
IPv6 Test MethodologyIPv6 Test Methodology
IPv6 Test Methodology
 
Server Load Balancer Test Methodology
Server Load Balancer Test MethodologyServer Load Balancer Test Methodology
Server Load Balancer Test Methodology
 
How to Test High-Performance Next-Generation Firewalls
How to Test High-Performance Next-Generation FirewallsHow to Test High-Performance Next-Generation Firewalls
How to Test High-Performance Next-Generation Firewalls
 
Catalyst 6500 ASA Service Module
Catalyst 6500 ASA Service ModuleCatalyst 6500 ASA Service Module
Catalyst 6500 ASA Service Module
 
Testing High Performance Firewalls
Testing High Performance FirewallsTesting High Performance Firewalls
Testing High Performance Firewalls
 
BreakingPoint & Fortinet RSA Conference 2011 Presentation: Evaluating Enterpr...
BreakingPoint & Fortinet RSA Conference 2011 Presentation: Evaluating Enterpr...BreakingPoint & Fortinet RSA Conference 2011 Presentation: Evaluating Enterpr...
BreakingPoint & Fortinet RSA Conference 2011 Presentation: Evaluating Enterpr...
 
BreakingPoint & Juniper RSA Conference 2011 Presentation: Securing the High P...
BreakingPoint & Juniper RSA Conference 2011 Presentation: Securing the High P...BreakingPoint & Juniper RSA Conference 2011 Presentation: Securing the High P...
BreakingPoint & Juniper RSA Conference 2011 Presentation: Securing the High P...
 
BreakingPoint & Stonesoft RSA Conference 2011 Presentation: Evaluating IPS
BreakingPoint & Stonesoft RSA Conference 2011 Presentation: Evaluating IPSBreakingPoint & Stonesoft RSA Conference 2011 Presentation: Evaluating IPS
BreakingPoint & Stonesoft RSA Conference 2011 Presentation: Evaluating IPS
 
BreakingPoint & Juniper RSA Conference 2011 Presentation: Evaluating The Juni...
BreakingPoint & Juniper RSA Conference 2011 Presentation: Evaluating The Juni...BreakingPoint & Juniper RSA Conference 2011 Presentation: Evaluating The Juni...
BreakingPoint & Juniper RSA Conference 2011 Presentation: Evaluating The Juni...
 
BreakingPoint & Crossbeam RSA Conference 2011 Presentation: Evaluating High P...
BreakingPoint & Crossbeam RSA Conference 2011 Presentation: Evaluating High P...BreakingPoint & Crossbeam RSA Conference 2011 Presentation: Evaluating High P...
BreakingPoint & Crossbeam RSA Conference 2011 Presentation: Evaluating High P...
 
BreakingPoint & McAfee RSA Conference 2011 Presentation: Data Sheets Lie
BreakingPoint & McAfee RSA Conference 2011 Presentation: Data Sheets LieBreakingPoint & McAfee RSA Conference 2011 Presentation: Data Sheets Lie
BreakingPoint & McAfee RSA Conference 2011 Presentation: Data Sheets Lie
 
Cybersecurity: Arm and Train US Warriors to Win Cyber War
Cybersecurity: Arm and Train US Warriors to Win Cyber WarCybersecurity: Arm and Train US Warriors to Win Cyber War
Cybersecurity: Arm and Train US Warriors to Win Cyber War
 
Firewall Testing Methodology
Firewall Testing MethodologyFirewall Testing Methodology
Firewall Testing Methodology
 
Measure Network Performance, Security and Stability
Measure Network Performance, Security and StabilityMeasure Network Performance, Security and Stability
Measure Network Performance, Security and Stability
 

Dernier

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 

Dernier (20)

AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024
 

BreakingPoint 3G Testing Data Sheet

  • 1. BreakingPoint 3G Data Sheet Test 3G Network Performance, Security, and Stability at Massive Scale BreakingPoint CTM™ Products Emulate Millions of Users to Reduce Cost and Complexity of Validating 3G Wireless Infrastructure Telecom carriers dealing with the rapidly growing 3G user base With a BreakingPoint CTM you can: must test mobile infrastructures efficiently and accurately under • Measure and harden the performance, security, and stability punishing real-world conditions, without spending a fortune to do of load balancers, firewalls, IPS devices, and other equipment so. BreakingPoint CTM products go far beyond the simple functional with up to 120 gigabits per second of application, attack, and testing of current 3G validation tools by emulating millions of pieces malformed traffic. of user equipment (UE) while transmitting real-world application • Validate network and data center performance by recreating traffic and security attacks. more than 150 application protocols, including Twitter Mobile, BreakingPoint products allow carriers and equipment AOL® IM, Yahoo!® Mail and Messenger, Google® Gmail, Skype®, manufacturers to test 3G networks and devices against the behavior BitTorrent™, eDonkey, RADIUS, SIP, RTSP, RTP, HTTP, SSL, of millions of users streaming video, placing calls, purchasing music, Facebook®, YouTube®, and Apple® FaceTime®, as well as other or unknowingly sharing the latest malware. A BreakingPoint CTM mobile, social, and gaming protocols—with multicast support. replaces racks of equipment and complicated setup processes with • Stress network infrastructures with more than 4,500 security a single-chassis device and a single user interface. attacks and 28,000 pieces of malware—including more than 100 pieces of mobile malware—plus obfuscations and Unprecedented Performance and Massive Scale in a Cost- evasions. Effective Device • Find network problem areas sooner and prepare for the Based on a patented breakthrough in network processor unexpected with the industry’s fastest protocol fuzzing technology and backed by a team of network performance and capabilities. security experts, only a BreakingPoint CTM produces the city-scale 3G network conditions needed to harden carrier-grade network • Emulate sophisticated, large-scale DDoS and mobile-initiated resiliency. botnet attacks to uncover previously hidden weaknesses. For 3G GTP encapsulation, BreakingPoint emulates all elements in this diagram concurrently, or GGSN or SGSN in isolation.
  • 2. BreakingPoint 3G Data Sheet The Solution for Simulating Multi-Million-User 3G Networks, with Additional 4G/LTE Capability The unique architecture of BreakingPoint CTM products delivers the huge performance numbers necessary to validate and harden even the largest 3G networks under the most realistic conditions, all from a turnkey solution, including: • Up to 90 million concurrent TCP sessions, allowing emulation of millions of UEs such as smartphones, tablet computers, and netbooks. • Interactions among the key network elements involved in 3G communications, including serving GPRS support nodes BreakingPoint FireStorm CTM Specifications (SGSNs) and gateway GPRS support nodes (GGSNs). A single BreakingPoint FireStorm CTM provides the equivalent • A full Dynamic Host Control Protocol (DHCP) network, with performance of many racks of servers from a 4U chassis, including: support for both DHCP Client and DHCP Server processes. • 120 gigabits per second of blended stateful application traffic • Support for both 3G and LTE environments with GTPv1 and • 90 million concurrent TCP sessions GTPv2. • 4 million TCP sessions per second Technological Breakthroughs from an Easy-to-Use Product • 1.5 million steady-state complete TCP sessions per second That Is Always Current • 120,000+ SSL sessions per second BreakingPoint CTMs are designed for ease of use and rapid • 150+ stateful application protocols configuration in a variety of network environments. Because of their • 4,500+ live security attacks exclusive design, they evolve along with the frequent changes in • 28,000+ pieces of malware the landscape for applications, attacks, and telecom standards. With • 1 Gigabit Ethernet and 10 Gigabit Ethernet interfaces a BreakingPoint CTM, you will: To learn more about all BreakingPoint products and services, visit • Receive frequent updates from the BreakingPoint Application www.breakingpoint.com/products. and Threat Intelligence (ATI) research team, which is dedicated to keeping applications and attacks current and providing Schedule a Demonstration Today frequent feature and performance enhancements. Find out why the world’s largest service providers rely on • Employ built-in network traffic profiles—created using BreakingPoint to measure and harden the resiliency of every data collected from top global telecom carriers—or easily component of their 3G infrastructures. Visit customize these profiles to fit your own network’s unique www.breakingpoint.com/3G. conditions. 1.866.352.6691 U.S. Toll-Free • Configure simulations in just minutes through a single user- www.breakingpoint.com friendly interface that features fully integrated reporting, even across multiple BreakingPoint CTMs. • Leverage extensive automation and wizard-like labs that address many use-case scenarios, including validation of Lawful Intercept and data loss prevention (DLP) solutions with a digital storm of content in multiple languages. Eliminate the complexity of conventional testing approaches and replace it with the simplicity, power, and precision of the BreakingPoint CTM. www.breakingpoint.com © 2005 - 2011. BreakingPoint Systems, Inc. All rights reserved. The BreakingPoint logo is a trademark of BreakingPoint Systems, Inc. All other trademarks are the property of their respective owners.