BreakingPoint

Keysight BPS

All-in-one applications and network security testing platform

Already own this product? Visit Technical Support

Highlights

  • Simulates more than 780 real-world application protocols.
  • Allows for customization and manipulation of any protocol, including raw data.
  • Generates a mix of protocols at high speed with realistic protocol weight.
  • Offers HTTP1.0, HTTP1.1, and HTTP/2 as transport with support for NAT and Proxy (for selected applications).
  • Supports more than 190,000 attacks and malwares.
  • Delivers from a single port all types of traffic simultaneously, including legitimate traffic, DDoS, and malware.
  • Bi-monthly Application and Threat Intelligence (ATI) subscription updates ensure you are current with the latest applications and threats.
  • Combined with the APS 100/400GE Series platform, BreakingPoint reaches a staggering performance with a fully-populated system — 3.2 Tbps / 5.1 billion sessions and 56 million connections per second — to emulate enterprise-wide networks to continent-scale mobile carrier networks.
  • Leverage the hyperscale performance of the new APS-100 / 400GE series platform. A single APS-ONE-100 delivers unparalleled real-world TLS performance of up to 100K TLS connections per second and 3.2M TLS concurrent connections and 150Gbps encrypted throughput. The ground-breaking scale of a 10-appliance system generates 1M TLS CPS, 32M TLS concurrent connections, and 1.5 Tbps encrypted TLS throughput.

Real-Time Challenges for Real-World Testing

These days, organizations rely on a wide variety of security solutions to protect their networks from cyber attacks and traffic anomalies. But the more tools deployed, the more complex a security infrastructure becomes. The result: a hodgepodge of security solutions that are tough to verify and challenging to scale. Worse yet, these complex system interactions pose a serious risk to security performance and network resiliency.

Today’s businesses require an application and security test solution that can verify the stability, accuracy, and quality of networks and network devices.

Ixia-BreakingPoint_0

Validate the security posture of your networks with real applications and a complete range of threat vectors

Introduction to BreakingPoint Application and Security Testing

By simulating real-world legitimate traffic, distributed denial of service (DDoS), exploits, malware, and fuzzing, BreakingPoint validates an organization’s security infrastructure, reduces the risk of network degradation by almost 80%, and increases attack readiness by nearly 70%. And with our new TrafficREWIND solution, you'll get even more realistic and high-fidelity validation by adding production network insight into BreakingPoint test traffic configurations.

How might a particular configuration or security setup withstand a cyber attack? BreakingPoint addresses that by simulating both good and bad traffic to validate and optimize networks under the most realistic conditions. Security infrastructures can also be verified at high-scale, ensuring ease of use, greater agility, and speedy network testing.

We've now simplified security and performance testing even further with the release of BreakingPoint QuickTest turn-key test suites designed to accelerate testing and reduce test tool learning curve.

See BreakingPoint in Action!

Watch this BreakingPoint Ultra-High Performance Test of FortiGate 7121F Enterprise Security Next-Generation Firewall (NGFW)

Watch this BreakingPoint SSL Performance Test of FortiGate 7121F Next-Generation Firewall (NGFW)

Featured Resources

Want help or have questions?