Author: Kyle Flaherty

  • Data Sheets Lie and How To Truly Measure the Performance and Security of a Network Device

    Have you ever questioned the performance and security claims on a data sheet? Have you ever wondered how the network equipment you deploy would hold up against an actual cyber attack and high-stress application load? At any point did you want a repeatable and deterministic score of a device’s performance and security rather than rely on data sheet assurances? The answer is most likely yes and it is why we wanted to look into this topic during our next webcast.

    Certification for performance and security is nothing new; in fact, we have come to expect it for everything from our phones to our automobiles. Yet network equipment, which supports our businesses and governments, has no standardized certification for performance and security. Instead we rely on statements made in product marketing literature, which are based on best-case scenarios, not real world truths.

    In this free webcast, we will:

    • Discuss the importance of using a repeatable, deterministic methodology for definitively measuring the performance, security and stability of network equipment.
    • Review data sheets from a handful of leading network equipment brands and expose some of the most common performance and security myths.
    • Apply this methodology to leading network equipment brands to reveal their true performance, security and stability capabilities.
    • Discuss the importance of the BreakingPoint Resiliency Score and the methodology behind it.
    • Demonstrate how you can quickly and cost-effectively determine the resiliency of network equipment.

    Register Now:

    BreakingPoint Webcast April 28: Data Sheets Lie: How To Truly Measure the Performance, Security and Stability of Network Devices

    network device resiliency

  • Webcast and Research Paper: Mobile Network Traffic Optimization

    Mobile broadband use is growing nearly as fast as complaints about mobile broadband connectivity and security. And it is no surprise. The next generation of mobile broadband is being transported using the same infrastructure put in place for wireline communication and it simply cannot hold up much longer.

    In our next webcast I’m going to be talking to our CTO Dennis Cox and one of our application protocol engineers Chris Adams. During the webcast we will be revealing never before published statistics on mobile application usage and mobile carrier traffic based on data provided by some of the largest mobile operators in Europe and North America.

    When register for the webcast you will also receive the research report with all the data that will be discussed. The report is your opportunity to look behind the curtain of the world’s largest mobile operators and see:

    • Relevant trends in mobile data and application traffic.
    • Actionable insights for defining the next generation secure, high performance mobile network.
    • How to validate network equipment performance and security using realistic traffic loads, handsets and application data.

    Register Now:

    BreakingPoint Webcast March 31: Five Tips For Optimizing Mobile Network Performance and Security

    mobile network traffic analysis

  • IPv6 Everywhere You Turn

    A few two weeks ago I sat down and moderated a conversation with BreakingPoint’s Dennis Cox and Brent Cook on IPv6. We spent nearly an hour talking about different aspects of IPv6 including removing some of the hype, security concerns and some of the vast benefits that can be had from IPv6. Not surprisingly IPv6 was a big topic at RSA Conference two weeks ago, particularly in conversations I had with people on the floor. In many cases they have the same questions we discussed during the webcast.

    I thought it would be helpful to provide the video of the IPv6 conversation with Dennis and Brent. I’ve put together the video with the slides below, enjoy:

  • From the Floor at RSA 2010: Real-World Mobile Network Traffic Validation

    On the show floor at RSA Conference there is a lot happening and overall the show seems much more well attended than last year. This show, as most of you know, is also a harbinger of news releases and product announcements. Crossbeam, providers of scalable software and hardware platforms, distributed a few pieces of news leading up to the show and at the conference itself. I went over to visit the Crossbeam booth (#545) while at RSA so check out a live demonstration of their X-Series security platform using four BreakingPoint Elite chassis. With this impressive demonstration in the background I talked with Crossbeam’s Peter Doggart.

    Q. First off Peter, can you provide us with an overview of what Crossbeam provides?

    Crossbeam’s X-Series security platform lets customers virtualize third-party, best-in-class security applications and scale them to meet the needs of large, high-performance network environments. Today, more than 900 leading enterprises and service providers, including 10 of the top 11 telecom carriers worldwide, rely on Crossbeam as the underlying architecture for the delivery of security services.

    Q. Crossbeam is demonstrating something very interesting here at RSA, can you tell us about what is going on and why?

    In working with service providers over the past year, and in particular mobile network operators (MNOs), it has become evident that they are under enormous pressure to meet growing network demands while simultaneously delivering “clean” data pipes.

    What we are showing at RSA is proof that our X-Series security platform delivers the world’s fastest firewall performance to meet the needs of mobile operators. Using BreakingPoint Elite, we are conducting a to stress-test the X-Series chassis. We are running a best-in-class application on the X-Series, Check Point Security Gateway R70 Firewall, to clean, inspect and secure the traffic.

    This demonstration shows how service providers and mobile carriers can easily scale their network security infrastructure to cope with the next generation of mobile technology, 4G/LTE, under real-world conditions.

    Q. You mention “real world” a few times in your answer and in the news release that went out. What does that mean to mobile network operators?

    There is a growing gap between what vendors state on their data sheets and what we typically see out in the real world in terms of performance. There are two key elements at play in the real world. First, we are seeing more attacks, which place a greater burden on our security systems and, second, we are seeing smaller payload sizes, especially with the growing number of mobile devices. The result is that mobile operators need to buy and manage a lot more equipment than they budgeted for as the real-world demands are far greater than they ever anticipated. This is not only more costly to them, but it is also a lot more complex to manage.

    Realistic tests like this one at RSA validate that we deliver the fastest-performing firewall on the market under real-world conditions which means that we can stand behind our performance claims and mobile network operators can be assured that their X-Series security infrastructure delivers the flexibility, superior performance and high availability required to handle the unpredictability of growing data traffic demands.

    Q. How can this type of validation, throughout the industry, not just at Crossbeam, help the overall performance of MNOs?

    Crossbeam’s policy is to be transparent when it comes to performance claims. We are doing the opposite of what many vendors do by actually creating tests that provide worst case metrics, not the best case. Take the RSA live demonstration. We are using BreakingPoint to generate 96 byte HTTP packets, which in the real mobile world would be the worst case payload size. At Crossbeam, we want to create some real-world industry guidelines that everyone follows so mobile operators, government and enterprise customers understand exactly what they are buying, and can capacity plan correctly.

    Q. I noticed four BreakingPoint chassis in the Crossbeam booth generating the traffic for the demonstration. Why does Crossbeam use BreakingPoint for product validation?

    First, we use the BreakingPoint Elite chassis because they can accurately simulate the type of traffic we see in the real world and, second, because BreakingPoint is the only vendor that can push the Crossbeam chassis to its current performance limits.

    Q. How has using BreakingPoint helped the evolution of Crossbeam products?

    Because BreakingPoint equipment pushes our chassis to its absolute limits, Crossbeam is better able to fine-tune its performance to address customer needs with the assurance that the X-Series can handle their network demands. In the latest release of the X-Series operating system, for instance, we boosted the number of concurrent IP connections we can support up to 10 million, and increased the new connection rates per second to 320,000. These numbers are critical to mobile operators who need to support the growing number of smartphones and other devices, which create more traffic than traditional mobile phones and are nearly always connected. Without BreakingPoint, we couldn’t have confidence in our real-world performance metrics.

  • Replace Vendor Assurances With Measurable Answers

    This morning on the floor of RSA Conference BreakingPoint unveiled the BreakingPoint Resiliency Score™, a new approach to objectively measure the resiliency of network and security equipment, putting an end to data sheet speculation. We’ve all been there, of course, reading a product data sheet that provides data on performance and security of a piece of network or data center equipment. But, we have all reached the point where we basically ignore much of this data.

    The reason isn’t that the information is fictitious, it is simply not based on real-world scenarios. BreakingPoint is all about real-world simulation, as anyone who reads this blog regularly knows. The BreakingPoint Resiliency Score takes this ability to simulate real-world applications, real-time security strikes and maximum load to provide an objective, repeatable and scientifically measured certification of the performance, security and stability of any network or network device.

    The press release that went out this morning had a great quote from BreakingPoint CTO Dennis Cox. It summarizes why this is important for all of us:

    “Certification for performance and security is nothing new; in fact, we have come to expect it for everything from our phones to our automobiles. Yet network equipment, which supports our businesses and governments, has no standardized certification for performance and security. Instead we rely on statements made in product marketing literature, which are based on best-case scenarios, not real-world truths. Organizations want measurable answers, not assurances, when it comes to cybersecurity. The BreakingPoint Resiliency Score cuts through all the speculation and confusion and uses a scientific methodology that provides a deterministic and repeatable certification of any vendor claim.”

    If you are at RSA Conference stop by booth 1356 and we would gladly show you how Resiliency Score works.

  • Application Protocol Fuzzing

    Application protocol fuzzing resources