SlideShare une entreprise Scribd logo
1  sur  2
Télécharger pour lire hors ligne
BreakingPoint Storm CTM™:
                                                                                           The Alternative to Costly and Complex Cyber Ranges




The BreakingPoint Storm CTM™: The Alternative to
Costly and Complex Cyber Ranges
Unleash Internet-scale cyber war in a controlled environment to measure the resiliency of network and data
center infrastructures, advance research and development, and train cyber warriors


Cyber ranges are critical tools for hardening the resiliency—security,   attack. With its innovative, future-proof approach to delivering the
stability, and performance—of vital government, military, and            capabilities of a traditional cyber range from a 3-slot chassis, a single
intelligence cyber infrastructures. Yet cyber ranges require massive     BreakingPoint Storm CTM emulates a complete global network with:
amounts of disparate equipment from multiple vendors, large                 •	 A blend of stateful application and malicious traffic at 40
numbers of skilled personnel, and long development and testing                 Gigabits per second
cycles. In the past, only this resource-intensive approach could           •	 An always-current mix of traffic from hundreds of real-world
generate the real-world conditions needed to harden defenses                  application protocols and thousands of attacks
against the full spectrum of cyber threats.                                •	 The ability to create and accelerate custom applications and
                                                                              attacks
Building and maintaining a cyber range by throwing hardware                •	 More than 30 million concurrent TCP sessions to emulate
and personnel at the problem is a costly and wasteful exercise. This          millions of users
inefficiency does not make sense in an era of flattened defense            •	 Comprehensive security coverage including attacks, fuzzing,
budgets and scarce human resources. More importantly, this                    malware, obfuscations, and evasions
approach simply cannot scale to address traffic volume and attacks         •	 Built-in traffic profiles and use-case methodologies to
that are multiplying in both quantity and complexity. These realities         accelerate productivity
mandate a new model for the modern cyber range—a “leap-ahead”
technological approach that unleashes Internet-scale cyber war           Exclusive Capabilities
from a single comprehensive, easy-to-maintain device.                    Attack, measure, and harden the resiliency of network and data
                                                                         center infrastructures with unprecedented performance and
The BreakingPoint Storm CTM: Complete Cyber Range                        realism.
Functionality and Massive Scale in a Small Footprint                       •	 Only the BreakingPoint Storm CTM can emulate your own
The BreakingPoint Cyber Tomography Machine (CTM) answers this                 large-scale network conditions with the performance, stateful
challenge because it embodies the power and scope of a cyber                  applications, and current attacks needed to fully validate the
range, but without requiring multi-million-dollar expenditures                deep packet inspection (DPI) technologies prevalent in today’s
and teams of engineers to set up and maintain. The patented                   networks and data centers.
BreakingPoint Storm CTM is used by government and military                 •	 The product includes more than 150 application protocols,
organizations, as well as leading defense contractors, global                 including AOL® IM, Yahoo!® Mail and Messenger, Google® Gmail,
enterprises, and service providers, to harden networks and data               Skype®, BitTorrent™, eDonkey, RADIUS, SIP, mobile network,
centers to be resilient in the face of escalating application load and        social network, and gaming protocols. It also provides more
                                                                              than 4,500 attacks and is backed by an Application and Threat
                                                                              Intelligence research team dedicated to keeping applications
                                                                              and attacks current, delivering Microsoft Tuesday coverage, and
                                                                              providing frequent feature and performance enhancements.
                                                                           •	 The integrated BreakingPoint Resiliency Score™ provides
                                                                              standardized and repeatable measurements of the security,
                                                                              stability, and performance of every component of networks
                                                                              and data centers. Developed using standards by organizations
                                                                              such as US–CERT, IEEE, and the IETF, as well as insight into traffic
                                                                              from the world’s largest service providers, it provides advance
                                                                              insight into how your product or environment will be impacted
BreakingPoint Storm CTM™:
                                                                                                                       The Alternative to Costly and Complex Cyber Ranges


     by changes such as peak user load, network reconfiguration,                                      simulated Distributed Denial of Service (DDoS) and botnet
     and new security attacks.                                                                        attacks, and leverage the BreakingPoint Custom Toolkits to
  •	 The BreakingPoint Storm CTM subjects massive virtualized                                         develop and accelerate your own applications and attacks.
     infrastructures to peak user load and attack to evaluate and                                 •	 Emulate, attack, and evaluate network operations and security
     optimize the resiliency of cloud services.                                                      defenses at any level of detail using one of the industry’s largest
  •	 It also includes an easy-to-use automated lab for validating                                    packet capture buffers.
     Lawful Intercept and Data Loss Prevention solutions using a
                                                                                               BreakingPoint Storm CTM Specifications
     digital storm of content from evergreen application protocols
                                                                                               Based on a patented breakthrough in network processor
     and communications in multiple languages.
                                                                                               architecture and backed by a team of network performance and
Conduct advanced and repeatable research and development                                       security experts, only the BreakingPoint Storm CTM produces
experiments with this automated and configurable solution.                                     Internet-scale cyber war conditions in a comprehensive, easy-to-use,
  •	 The BreakingPoint Storm CTM accurately simulates the real-                                and low-maintenance product. This 3-slot chassis device provides
     world scale and complexities of cyber warfare with prebuilt                               the equivalent performance and capabilities of hundreds of racks of
     traffic profiles, real applications and attacks, and the behavior                         high performance servers, including:
     of millions of users to evaluate and accelerate advances in                                  •	 40 Gigabits per second of blended stateful application traffic
     offensive and defensive technologies.                                                        •	 30 million concurrent TCP sessions
  •	 Multiple BreakingPoint Storm CTMs can also be combined                                       •	 1.5 million TCP sessions per second
     using a single interface and a single configuration for even
                                                                                                  •	 80,000+ SSL sessions per second
     greater performance; previous deployments have emulated up
                                                                                                  •	 600,000+ complete TCP sessions per second
     to 300,000,000 Internet users at once.
                                                                                                  •	 150+ stateful application protocols
  •	 The product creates a barrage of unstructured data in multiple
     languages, allowing users to conduct experiments in data                                     •	 4,500+ live security attacks
     detection, intercept, and analysis.                                                       To find out more about what BreakingPoint can do for your
  •	 BreakingPoint also provides a BreakingPoint Custom                                        organization, contact the BreakingPoint Government Solutions
     Application Toolkit and Custom Attack Toolkit to accelerate the                           Group at government@breakingpoint.com, 703.443.1501 or visit
     delivery of custom attacks and proprietary applications, and                              www.breakingpoint.com/demo to schedule an evaluation.
     analyze the results.
  •	 With BreakingPoint’s Psuedo Random Number Generation
     (PRNG) capabilities, users can produce random yet repeatable
     simulations using a PRNG seed to accelerate troubleshooting or
     analyze the effects.
  •	 Automated reporting provides rapid analysis and presentation of
     massive amounts of data to determine exactly what happened
     in each simulation, down to the level of each user simulated.

Evaluate and train cyber warriors by creating sophisticated,
distributed, and current cyber war exercises.
  •	 Just as a physical training ground allows soldiers to
     demonstrate and improve their combat skills, the
     BreakingPoint Storm CTM provides combatant commanders
     a digital environment in which to train, evaluate, and develop
     defensive and offensive capabilities.
  •	 Carry out sophisticated red team / blue team exercises, assess
     information assurance capabilities, measure the quality of incident
     response procedures, and more by simulating real attacks.
  •	 Conduct realistic opposing force (OPFOR) exercises, including



www.breakingpoint.com
© 2005 - 2011. BreakingPoint Systems, Inc. All rights reserved. The BreakingPoint logo is a trademark of BreakingPoint Systems, Inc.
All other trademarks are the property of their respective owners.

Contenu connexe

Plus de Ixia

Load Test Methodology: Server Load Testing
Load Test Methodology: Server Load TestingLoad Test Methodology: Server Load Testing
Load Test Methodology: Server Load Testing
Ixia
 
IPv6 Test Methodology
IPv6 Test MethodologyIPv6 Test Methodology
IPv6 Test Methodology
Ixia
 
Breakingpoint Application Threat and Intelligence (ATI) Program
Breakingpoint Application Threat and Intelligence (ATI) ProgramBreakingpoint Application Threat and Intelligence (ATI) Program
Breakingpoint Application Threat and Intelligence (ATI) Program
Ixia
 
BreakingPoint Custom Application Toolkit
BreakingPoint Custom Application ToolkitBreakingPoint Custom Application Toolkit
BreakingPoint Custom Application Toolkit
Ixia
 

Plus de Ixia (20)

IPS Test Methodology
IPS Test MethodologyIPS Test Methodology
IPS Test Methodology
 
Deep Packet Inspection (DPI) Test Methodology
Deep Packet Inspection (DPI) Test MethodologyDeep Packet Inspection (DPI) Test Methodology
Deep Packet Inspection (DPI) Test Methodology
 
Load Test Methodology: Server Load Testing
Load Test Methodology: Server Load TestingLoad Test Methodology: Server Load Testing
Load Test Methodology: Server Load Testing
 
IPv6 Test Methodology
IPv6 Test MethodologyIPv6 Test Methodology
IPv6 Test Methodology
 
Server Load Balancer Test Methodology
Server Load Balancer Test MethodologyServer Load Balancer Test Methodology
Server Load Balancer Test Methodology
 
How to Test High-Performance Next-Generation Firewalls
How to Test High-Performance Next-Generation FirewallsHow to Test High-Performance Next-Generation Firewalls
How to Test High-Performance Next-Generation Firewalls
 
Catalyst 6500 ASA Service Module
Catalyst 6500 ASA Service ModuleCatalyst 6500 ASA Service Module
Catalyst 6500 ASA Service Module
 
Testing High Performance Firewalls
Testing High Performance FirewallsTesting High Performance Firewalls
Testing High Performance Firewalls
 
BreakingPoint & Fortinet RSA Conference 2011 Presentation: Evaluating Enterpr...
BreakingPoint & Fortinet RSA Conference 2011 Presentation: Evaluating Enterpr...BreakingPoint & Fortinet RSA Conference 2011 Presentation: Evaluating Enterpr...
BreakingPoint & Fortinet RSA Conference 2011 Presentation: Evaluating Enterpr...
 
BreakingPoint & Juniper RSA Conference 2011 Presentation: Securing the High P...
BreakingPoint & Juniper RSA Conference 2011 Presentation: Securing the High P...BreakingPoint & Juniper RSA Conference 2011 Presentation: Securing the High P...
BreakingPoint & Juniper RSA Conference 2011 Presentation: Securing the High P...
 
BreakingPoint & Stonesoft RSA Conference 2011 Presentation: Evaluating IPS
BreakingPoint & Stonesoft RSA Conference 2011 Presentation: Evaluating IPSBreakingPoint & Stonesoft RSA Conference 2011 Presentation: Evaluating IPS
BreakingPoint & Stonesoft RSA Conference 2011 Presentation: Evaluating IPS
 
BreakingPoint & Juniper RSA Conference 2011 Presentation: Evaluating The Juni...
BreakingPoint & Juniper RSA Conference 2011 Presentation: Evaluating The Juni...BreakingPoint & Juniper RSA Conference 2011 Presentation: Evaluating The Juni...
BreakingPoint & Juniper RSA Conference 2011 Presentation: Evaluating The Juni...
 
BreakingPoint & Crossbeam RSA Conference 2011 Presentation: Evaluating High P...
BreakingPoint & Crossbeam RSA Conference 2011 Presentation: Evaluating High P...BreakingPoint & Crossbeam RSA Conference 2011 Presentation: Evaluating High P...
BreakingPoint & Crossbeam RSA Conference 2011 Presentation: Evaluating High P...
 
BreakingPoint & McAfee RSA Conference 2011 Presentation: Data Sheets Lie
BreakingPoint & McAfee RSA Conference 2011 Presentation: Data Sheets LieBreakingPoint & McAfee RSA Conference 2011 Presentation: Data Sheets Lie
BreakingPoint & McAfee RSA Conference 2011 Presentation: Data Sheets Lie
 
Cybersecurity: Arm and Train US Warriors to Win Cyber War
Cybersecurity: Arm and Train US Warriors to Win Cyber WarCybersecurity: Arm and Train US Warriors to Win Cyber War
Cybersecurity: Arm and Train US Warriors to Win Cyber War
 
Firewall Testing Methodology
Firewall Testing MethodologyFirewall Testing Methodology
Firewall Testing Methodology
 
BreakingPoint Cloud and Virtualization Data Sheet
BreakingPoint Cloud and Virtualization Data SheetBreakingPoint Cloud and Virtualization Data Sheet
BreakingPoint Cloud and Virtualization Data Sheet
 
Measure Network Performance, Security and Stability
Measure Network Performance, Security and StabilityMeasure Network Performance, Security and Stability
Measure Network Performance, Security and Stability
 
Breakingpoint Application Threat and Intelligence (ATI) Program
Breakingpoint Application Threat and Intelligence (ATI) ProgramBreakingpoint Application Threat and Intelligence (ATI) Program
Breakingpoint Application Threat and Intelligence (ATI) Program
 
BreakingPoint Custom Application Toolkit
BreakingPoint Custom Application ToolkitBreakingPoint Custom Application Toolkit
BreakingPoint Custom Application Toolkit
 

Dernier

Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Victor Rentea
 

Dernier (20)

ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering Developers
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 

BreakingPoint Storm CTM - The Alternative to Costly and Complex Cyber Range Data Sheet

  • 1. BreakingPoint Storm CTM™: The Alternative to Costly and Complex Cyber Ranges The BreakingPoint Storm CTM™: The Alternative to Costly and Complex Cyber Ranges Unleash Internet-scale cyber war in a controlled environment to measure the resiliency of network and data center infrastructures, advance research and development, and train cyber warriors Cyber ranges are critical tools for hardening the resiliency—security, attack. With its innovative, future-proof approach to delivering the stability, and performance—of vital government, military, and capabilities of a traditional cyber range from a 3-slot chassis, a single intelligence cyber infrastructures. Yet cyber ranges require massive BreakingPoint Storm CTM emulates a complete global network with: amounts of disparate equipment from multiple vendors, large • A blend of stateful application and malicious traffic at 40 numbers of skilled personnel, and long development and testing Gigabits per second cycles. In the past, only this resource-intensive approach could • An always-current mix of traffic from hundreds of real-world generate the real-world conditions needed to harden defenses application protocols and thousands of attacks against the full spectrum of cyber threats. • The ability to create and accelerate custom applications and attacks Building and maintaining a cyber range by throwing hardware • More than 30 million concurrent TCP sessions to emulate and personnel at the problem is a costly and wasteful exercise. This millions of users inefficiency does not make sense in an era of flattened defense • Comprehensive security coverage including attacks, fuzzing, budgets and scarce human resources. More importantly, this malware, obfuscations, and evasions approach simply cannot scale to address traffic volume and attacks • Built-in traffic profiles and use-case methodologies to that are multiplying in both quantity and complexity. These realities accelerate productivity mandate a new model for the modern cyber range—a “leap-ahead” technological approach that unleashes Internet-scale cyber war Exclusive Capabilities from a single comprehensive, easy-to-maintain device. Attack, measure, and harden the resiliency of network and data center infrastructures with unprecedented performance and The BreakingPoint Storm CTM: Complete Cyber Range realism. Functionality and Massive Scale in a Small Footprint • Only the BreakingPoint Storm CTM can emulate your own The BreakingPoint Cyber Tomography Machine (CTM) answers this large-scale network conditions with the performance, stateful challenge because it embodies the power and scope of a cyber applications, and current attacks needed to fully validate the range, but without requiring multi-million-dollar expenditures deep packet inspection (DPI) technologies prevalent in today’s and teams of engineers to set up and maintain. The patented networks and data centers. BreakingPoint Storm CTM is used by government and military • The product includes more than 150 application protocols, organizations, as well as leading defense contractors, global including AOL® IM, Yahoo!® Mail and Messenger, Google® Gmail, enterprises, and service providers, to harden networks and data Skype®, BitTorrent™, eDonkey, RADIUS, SIP, mobile network, centers to be resilient in the face of escalating application load and social network, and gaming protocols. It also provides more than 4,500 attacks and is backed by an Application and Threat Intelligence research team dedicated to keeping applications and attacks current, delivering Microsoft Tuesday coverage, and providing frequent feature and performance enhancements. • The integrated BreakingPoint Resiliency Score™ provides standardized and repeatable measurements of the security, stability, and performance of every component of networks and data centers. Developed using standards by organizations such as US–CERT, IEEE, and the IETF, as well as insight into traffic from the world’s largest service providers, it provides advance insight into how your product or environment will be impacted
  • 2. BreakingPoint Storm CTM™: The Alternative to Costly and Complex Cyber Ranges by changes such as peak user load, network reconfiguration, simulated Distributed Denial of Service (DDoS) and botnet and new security attacks. attacks, and leverage the BreakingPoint Custom Toolkits to • The BreakingPoint Storm CTM subjects massive virtualized develop and accelerate your own applications and attacks. infrastructures to peak user load and attack to evaluate and • Emulate, attack, and evaluate network operations and security optimize the resiliency of cloud services. defenses at any level of detail using one of the industry’s largest • It also includes an easy-to-use automated lab for validating packet capture buffers. Lawful Intercept and Data Loss Prevention solutions using a BreakingPoint Storm CTM Specifications digital storm of content from evergreen application protocols Based on a patented breakthrough in network processor and communications in multiple languages. architecture and backed by a team of network performance and Conduct advanced and repeatable research and development security experts, only the BreakingPoint Storm CTM produces experiments with this automated and configurable solution. Internet-scale cyber war conditions in a comprehensive, easy-to-use, • The BreakingPoint Storm CTM accurately simulates the real- and low-maintenance product. This 3-slot chassis device provides world scale and complexities of cyber warfare with prebuilt the equivalent performance and capabilities of hundreds of racks of traffic profiles, real applications and attacks, and the behavior high performance servers, including: of millions of users to evaluate and accelerate advances in • 40 Gigabits per second of blended stateful application traffic offensive and defensive technologies. • 30 million concurrent TCP sessions • Multiple BreakingPoint Storm CTMs can also be combined • 1.5 million TCP sessions per second using a single interface and a single configuration for even • 80,000+ SSL sessions per second greater performance; previous deployments have emulated up • 600,000+ complete TCP sessions per second to 300,000,000 Internet users at once. • 150+ stateful application protocols • The product creates a barrage of unstructured data in multiple languages, allowing users to conduct experiments in data • 4,500+ live security attacks detection, intercept, and analysis. To find out more about what BreakingPoint can do for your • BreakingPoint also provides a BreakingPoint Custom organization, contact the BreakingPoint Government Solutions Application Toolkit and Custom Attack Toolkit to accelerate the Group at government@breakingpoint.com, 703.443.1501 or visit delivery of custom attacks and proprietary applications, and www.breakingpoint.com/demo to schedule an evaluation. analyze the results. • With BreakingPoint’s Psuedo Random Number Generation (PRNG) capabilities, users can produce random yet repeatable simulations using a PRNG seed to accelerate troubleshooting or analyze the effects. • Automated reporting provides rapid analysis and presentation of massive amounts of data to determine exactly what happened in each simulation, down to the level of each user simulated. Evaluate and train cyber warriors by creating sophisticated, distributed, and current cyber war exercises. • Just as a physical training ground allows soldiers to demonstrate and improve their combat skills, the BreakingPoint Storm CTM provides combatant commanders a digital environment in which to train, evaluate, and develop defensive and offensive capabilities. • Carry out sophisticated red team / blue team exercises, assess information assurance capabilities, measure the quality of incident response procedures, and more by simulating real attacks. • Conduct realistic opposing force (OPFOR) exercises, including www.breakingpoint.com © 2005 - 2011. BreakingPoint Systems, Inc. All rights reserved. The BreakingPoint logo is a trademark of BreakingPoint Systems, Inc. All other trademarks are the property of their respective owners.