SlideShare a Scribd company logo
How To Evaluate High-Performance Firewalls
About Crossbeam Crossbeam helps the Global 2000, Service Providers and Government agencies consolidate their security infrastructure.Crossbeam’s openplatform - the X-Series - scales linearly and offers best-of-breed securityDeployed in 10 out of top 11 Service Providers in the worldDeployed in 1000+ Global Enterprise CompaniesGlobal operations – 11 Years Strong. Headquarters: Outside Boston, MA
Support & services in over 50 countries
60+ Global Integrators
50+% International Business
13 out of 14 Quarters positive EBITDAL2InternetL2IPSFWLBLBLBLBThe Crossbeam Virtual InfrastructureCrossbeam creates a “Network in a Box”Network Processor Modules
Application Processor Modules
Control Processing ModulesThe X-Series Platform becomes a “Virtual Infrastructure” integrating both Network Processing & Application Processing
The Crossbeam X-Series PortfolioThe Most Scalable Open Secure PlatformsX20X30X60X80-S4-Slot Flexible Chassis
Pre-Configured for one application
Expandable to 2 applications
5Gbps Backplane Performance
4-Slot Flexible Chassis

More Related Content

PPTX
Measure Network Performance, Security and Stability
PDF
BreakingPoint & Crossbeam RSA Conference 2011 Presentation: Evaluating High P...
PDF
BreakingPoint & Juniper RSA Conference 2011 Presentation: Securing the High P...
PDF
BreakingPoint & Juniper RSA Conference 2011 Presentation: Evaluating The Juni...
PDF
Firewall Testing Methodology
PDF
BreakingPoint & Stonesoft RSA Conference 2011 Presentation: Evaluating IPS
PDF
BreakingPoint & McAfee RSA Conference 2011 Presentation: Data Sheets Lie
PDF
BreakingPoint Storm CTM Cost-Effective Testing Solution
Measure Network Performance, Security and Stability
BreakingPoint & Crossbeam RSA Conference 2011 Presentation: Evaluating High P...
BreakingPoint & Juniper RSA Conference 2011 Presentation: Securing the High P...
BreakingPoint & Juniper RSA Conference 2011 Presentation: Evaluating The Juni...
Firewall Testing Methodology
BreakingPoint & Stonesoft RSA Conference 2011 Presentation: Evaluating IPS
BreakingPoint & McAfee RSA Conference 2011 Presentation: Data Sheets Lie
BreakingPoint Storm CTM Cost-Effective Testing Solution

What's hot (20)

PDF
BreakingPoint & Fortinet RSA Conference 2011 Presentation: Evaluating Enterpr...
PDF
LTE Testing
PDF
Measuring Private Cloud Resiliency
PPTX
Testing High Performance Firewalls
PDF
IPS Test Methodology
PPTX
TechWiseTV Workshop: OpenDNS and AnyConnect
PDF
Cisco amp for meraki
PPTX
Sasa milic, cisco advanced malware protection
PPSX
SonicWALL Advanced Features
PDF
FireSIGHT Management Center (FMC) slides
PPTX
Sourcefire Webinar - NEW GENERATION IPS
PPTX
Cisco asa fire power services
PDF
ASA Firepower NGFW Update and Deployment Scenarios
PDF
Inherent Security Design Patterns for SDN/NFV Deployments
PDF
Symantec Endpoint Suite
PDF
Cisco umbrella overview
PDF
How to Plan for Performance and Scale for Multiplayer Games
PDF
Presentación - Cisco ASA with FirePOWER Services
PDF
The Network as a Sensor, Cisco and Lancope
PPTX
Security at the Speed of the Network
BreakingPoint & Fortinet RSA Conference 2011 Presentation: Evaluating Enterpr...
LTE Testing
Measuring Private Cloud Resiliency
Testing High Performance Firewalls
IPS Test Methodology
TechWiseTV Workshop: OpenDNS and AnyConnect
Cisco amp for meraki
Sasa milic, cisco advanced malware protection
SonicWALL Advanced Features
FireSIGHT Management Center (FMC) slides
Sourcefire Webinar - NEW GENERATION IPS
Cisco asa fire power services
ASA Firepower NGFW Update and Deployment Scenarios
Inherent Security Design Patterns for SDN/NFV Deployments
Symantec Endpoint Suite
Cisco umbrella overview
How to Plan for Performance and Scale for Multiplayer Games
Presentación - Cisco ASA with FirePOWER Services
The Network as a Sensor, Cisco and Lancope
Security at the Speed of the Network
Ad

Similar to How to Test High-Performance Next-Generation Firewalls (20)

PDF
Spirent Virtual Solution
PPTX
Reallinx 2011 product catalog v1.5
PPT
Trusted Reliability & Performance with the AppExchange Platform
PDF
IBM InterConnect 2013 Cloud General Session: George Karidis
PDF
Presentation applications with the power of soft layer
PPTX
Customer Highleveloverview
PPTX
GCX Cloud X Customer Presentation - Enterprise (Nov. 2014)
PDF
Cisco Connect 2018 Malaysia - Secure data center and mobility solutions
PDF
Whats new in data power
PPTX
Spider & F5 Round Table - Application Centric Security
PDF
2011-08-10 In-Q-Tel Technology Focus Day, Trends & Observations in Open Sourc...
PPTX
Evaluating Network and Security Devices
PPTX
F5 GOV Round Table - Application Centeric Security
PPTX
Capstone Official (1)
PDF
Presentation cloud infrastructure and management – from v sphere to vcloud ...
PDF
Presentation cloud infrastructure and management – from v sphere to vcloud ...
PDF
Cisco Connect Toronto 2017 - Putting Firepower into the Next Generation Firewall
PDF
f5_synthesis_cisco_connect.pdf
PPTX
Jimbob's Towing and Wrecker Services Presentation
PPTX
JWTS Presentation
Spirent Virtual Solution
Reallinx 2011 product catalog v1.5
Trusted Reliability & Performance with the AppExchange Platform
IBM InterConnect 2013 Cloud General Session: George Karidis
Presentation applications with the power of soft layer
Customer Highleveloverview
GCX Cloud X Customer Presentation - Enterprise (Nov. 2014)
Cisco Connect 2018 Malaysia - Secure data center and mobility solutions
Whats new in data power
Spider & F5 Round Table - Application Centric Security
2011-08-10 In-Q-Tel Technology Focus Day, Trends & Observations in Open Sourc...
Evaluating Network and Security Devices
F5 GOV Round Table - Application Centeric Security
Capstone Official (1)
Presentation cloud infrastructure and management – from v sphere to vcloud ...
Presentation cloud infrastructure and management – from v sphere to vcloud ...
Cisco Connect Toronto 2017 - Putting Firepower into the Next Generation Firewall
f5_synthesis_cisco_connect.pdf
Jimbob's Towing and Wrecker Services Presentation
JWTS Presentation
Ad

More from Ixia (16)

PDF
BreakingPoint 3G Testing Data Sheet
PDF
LTE Testing | 4G Testing
PDF
White Paper: Six-Step Competitive Device Evaluation
PDF
Deep Packet Inspection (DPI) Test Methodology
PDF
Load Test Methodology: Server Load Testing
PDF
IPv6 Test Methodology
PDF
Server Load Balancer Test Methodology
PPTX
Catalyst 6500 ASA Service Module
PDF
Cybersecurity: Arm and Train US Warriors to Win Cyber War
PDF
BreakingPoint Cloud and Virtualization Data Sheet
PDF
Breakingpoint Application Threat and Intelligence (ATI) Program
PDF
BreakingPoint Custom Application Toolkit
PDF
LTE Testing - Network Performance, Security, and Stability at Massive Scale
PDF
BreakingPoint Resiliency Score Data Sheet
PDF
BreakingPoint FireStorm CTM Datasheet
PPTX
Harden Security Devices Against Increasingly Sophisticated Evasions
BreakingPoint 3G Testing Data Sheet
LTE Testing | 4G Testing
White Paper: Six-Step Competitive Device Evaluation
Deep Packet Inspection (DPI) Test Methodology
Load Test Methodology: Server Load Testing
IPv6 Test Methodology
Server Load Balancer Test Methodology
Catalyst 6500 ASA Service Module
Cybersecurity: Arm and Train US Warriors to Win Cyber War
BreakingPoint Cloud and Virtualization Data Sheet
Breakingpoint Application Threat and Intelligence (ATI) Program
BreakingPoint Custom Application Toolkit
LTE Testing - Network Performance, Security, and Stability at Massive Scale
BreakingPoint Resiliency Score Data Sheet
BreakingPoint FireStorm CTM Datasheet
Harden Security Devices Against Increasingly Sophisticated Evasions

Recently uploaded (20)

PPTX
TechTalks-8-2019-Service-Management-ITIL-Refresh-ITIL-4-Framework-Supports-Ou...
PDF
ENT215_Completing-a-large-scale-migration-and-modernization-with-AWS.pdf
PDF
A novel scalable deep ensemble learning framework for big data classification...
PDF
Microsoft Solutions Partner Drive Digital Transformation with D365.pdf
PDF
WOOl fibre morphology and structure.pdf for textiles
PPTX
OMC Textile Division Presentation 2021.pptx
PDF
Zenith AI: Advanced Artificial Intelligence
PDF
Assigned Numbers - 2025 - Bluetooth® Document
PPTX
Tartificialntelligence_presentation.pptx
PDF
2021 HotChips TSMC Packaging Technologies for Chiplets and 3D_0819 publish_pu...
PPTX
Group 1 Presentation -Planning and Decision Making .pptx
PDF
Univ-Connecticut-ChatGPT-Presentaion.pdf
PPT
What is a Computer? Input Devices /output devices
PDF
DASA ADMISSION 2024_FirstRound_FirstRank_LastRank.pdf
PPTX
Chapter 5: Probability Theory and Statistics
PDF
Developing a website for English-speaking practice to English as a foreign la...
PDF
August Patch Tuesday
PDF
Getting Started with Data Integration: FME Form 101
PPTX
observCloud-Native Containerability and monitoring.pptx
PDF
STKI Israel Market Study 2025 version august
TechTalks-8-2019-Service-Management-ITIL-Refresh-ITIL-4-Framework-Supports-Ou...
ENT215_Completing-a-large-scale-migration-and-modernization-with-AWS.pdf
A novel scalable deep ensemble learning framework for big data classification...
Microsoft Solutions Partner Drive Digital Transformation with D365.pdf
WOOl fibre morphology and structure.pdf for textiles
OMC Textile Division Presentation 2021.pptx
Zenith AI: Advanced Artificial Intelligence
Assigned Numbers - 2025 - Bluetooth® Document
Tartificialntelligence_presentation.pptx
2021 HotChips TSMC Packaging Technologies for Chiplets and 3D_0819 publish_pu...
Group 1 Presentation -Planning and Decision Making .pptx
Univ-Connecticut-ChatGPT-Presentaion.pdf
What is a Computer? Input Devices /output devices
DASA ADMISSION 2024_FirstRound_FirstRank_LastRank.pdf
Chapter 5: Probability Theory and Statistics
Developing a website for English-speaking practice to English as a foreign la...
August Patch Tuesday
Getting Started with Data Integration: FME Form 101
observCloud-Native Containerability and monitoring.pptx
STKI Israel Market Study 2025 version august

How to Test High-Performance Next-Generation Firewalls

Editor's Notes

  • #6: Your business is in the middle of a firestorm:Increasing user load and dynamic high bandwidth application trafficSophisticated high-speed network and security devices with bugs and vulnerabilities baked inInsecure “out-of-the-box” configurationsNew zero-day attacks every dayRelentless stream of patches Legacy resource-intensive testing makes it cost-prohibitive to achieve the right balance of performance and security
  • #7: Resiliency: performance, security, stability under real-world network conditions
  • #10: Detection and blocking capabilities under load and under attack
  • #12: Based on a patented breakthrough in network processor-driven innovation, only the BreakingPoint Storm CTM allows anyone to unleash Internet-scale cyberwar in a controlled environment. A single BreakingPoint Storm CTM produces high-performance traffic from hundreds of real-world applications, load from millions of users, and comprehensive security coverage that includes thousands of current attacks and malware, as well as obfuscation and evasion techniques. The product features built-in automation to:Produce a standardized Resiliency Score™ to measure network and data center performance, security and stabilityMeasure the performance of massive virtualized infrastructures in the face of peak user load and attackValidate the accuracy and performance of Lawful Intercept and Data Loss Prevention systemsAnd the architecture of this device makes it futureproof and always current. This means that you can use it to conduct accurate research into cyber conditions – not just today, but for many years to come.Businesses, Governments, and Internet users expect secure, reliable, and fast access to data and communications. When security measures slow network performance, communications are lost, agility is compromised, and billions of dollars are wasted. If security measures are not rigorous, critical information and national security are compromised and costs skyrocket. The goal is to find the optimal balance of security and performance to assure cyber infrastructure resiliency.The enemy of resiliency is network mayhem. Today’s public and private network infrastructures are complex, dynamic, and increasingly vulnerable to network mayhem in the form of cyber attacks, viruses, human error, and escalating traffic from bandwidth-heavy or easily compromised applications such as BitTorrent, Gmail, YouTube, Twitter, iPhone, Skype, and hundreds of others. BreakingPoint creates network mayhem by simulating true global network conditions with a current mix of blended application traffic and live security attacks at live network speeds, as well as traffic from millions of users, to assure resilient networks, Web applications and cloud services. Powered by high-speed network processors and specialized hardware, the BreakingPoint Storm emits high-speed stress vectors composed of a global, custom, and current mix of application and attack traffic. This precision product then images the effects of the stress vectors on a discrete device or a device within a network.
  • #13: Enterprise firewalls understand the application logic, and have a detailed knowledge of the acceptable rules of engagement between the external client and the internal application server. They are thus capable of inspecting the content of each request and response and applying a complex set of rules in order to ensure that the client is not doing anything malicious. The more closely a firewall examines network data, the greater the latency. That’s why it is vital that you validate performance and functionality together both under load and under attack.To test enterprise firewalls that incorporate DPI capability requires an authentic blend of application traffic from applications such as databases, peer to peer traffic, etc. combined with live security strikes, at multi-gigabit speeds. The test environment should emulate a live network environment as closely as possible. BreakingPoint enables the thorough testing of all the components of a Firewall device in a controlled and repeatable manner with realistic application traffic and maximum load conditions. BreakingPoint enables you to simulate different application protocols including a full range of databases, proprietary applications, as well as standard protocols such as HTTP.You can define a variety of settings to validate the WAF under different configurations.The BreakingPoint NP-driven architecture makes it easy to simulate a large number of different clients and server to validate performance under load by simulating thousands or millions of users with over 15 million concurrent TCPsessions BreakingPoint Storm simulates realistic network conditions to help you validate performance, attack detection and blocking, as well as stability and reliability under extended attack.