breakingpoint & stonesoft rsa conference 2011 presentation: evaluating ips
DESCRIPTION
BreakingPoint and Stonesoft presentation "Know the Score: Measure the Security and Performance of Your Next IPS" at the 2011 RSA Conference.TRANSCRIPT
![Page 1: BreakingPoint & Stonesoft RSA Conference 2011 Presentation: Evaluating IPS](https://reader034.vdocuments.us/reader034/viewer/2022051515/54c418804a79596c2d8b4597/html5/thumbnails/1.jpg)
Know the Score: Measure the Security and Performance of Your Next IPSFebruary 15th at 3:30pm
![Page 2: BreakingPoint & Stonesoft RSA Conference 2011 Presentation: Evaluating IPS](https://reader034.vdocuments.us/reader034/viewer/2022051515/54c418804a79596c2d8b4597/html5/thumbnails/2.jpg)
Who is Stonesoft?
• Founded in 1990• Global presence
– US Headquarters - Atlanta, GA– Global Headquarters - Helsinki, Finland– 60+ countries, 24 offices
• Next Generation Security Solutions: IPS, FW/VPN, SSL VPN, and Centralized Management – all High Availability
• Global innovator: 28 patents, 38 pending around High Availability and Performance
• Focus on simplifying the management of network security
2
![Page 3: BreakingPoint & Stonesoft RSA Conference 2011 Presentation: Evaluating IPS](https://reader034.vdocuments.us/reader034/viewer/2022051515/54c418804a79596c2d8b4597/html5/thumbnails/3.jpg)
IT Firestorm Threatens Business Performance
![Page 4: BreakingPoint & Stonesoft RSA Conference 2011 Presentation: Evaluating IPS](https://reader034.vdocuments.us/reader034/viewer/2022051515/54c418804a79596c2d8b4597/html5/thumbnails/4.jpg)
Is Your IPS Resilient to the Firestorm?
4
![Page 5: BreakingPoint & Stonesoft RSA Conference 2011 Presentation: Evaluating IPS](https://reader034.vdocuments.us/reader034/viewer/2022051515/54c418804a79596c2d8b4597/html5/thumbnails/5.jpg)
5 Keys to IPS Evaluation: #1
5
Performance Under Load + Attack
![Page 6: BreakingPoint & Stonesoft RSA Conference 2011 Presentation: Evaluating IPS](https://reader034.vdocuments.us/reader034/viewer/2022051515/54c418804a79596c2d8b4597/html5/thumbnails/6.jpg)
5 Keys to IPS Evaluation: #2
6
Security Under Load + Attack
![Page 7: BreakingPoint & Stonesoft RSA Conference 2011 Presentation: Evaluating IPS](https://reader034.vdocuments.us/reader034/viewer/2022051515/54c418804a79596c2d8b4597/html5/thumbnails/7.jpg)
5 Keys to IPS Evaluation: #3
7
Performance and Accuracy of Protocol Decoding
![Page 8: BreakingPoint & Stonesoft RSA Conference 2011 Presentation: Evaluating IPS](https://reader034.vdocuments.us/reader034/viewer/2022051515/54c418804a79596c2d8b4597/html5/thumbnails/8.jpg)
5 Keys to IPS Evaluation: #4
8
Detection of Obfuscated Attacks
![Page 9: BreakingPoint & Stonesoft RSA Conference 2011 Presentation: Evaluating IPS](https://reader034.vdocuments.us/reader034/viewer/2022051515/54c418804a79596c2d8b4597/html5/thumbnails/9.jpg)
5 Keys to IPS Evaluation: #5
9
Identify Memory Leaks
![Page 10: BreakingPoint & Stonesoft RSA Conference 2011 Presentation: Evaluating IPS](https://reader034.vdocuments.us/reader034/viewer/2022051515/54c418804a79596c2d8b4597/html5/thumbnails/10.jpg)
How? Attack Thyself!
INSERT R.S. GRAPHIC
Real Attacks• 4,500 live security attacks• 100+ evasions• Malware• Spam• DDoS and Botnet simulation• Custom attacks• Research and frequent updates
Real World Applications• 150+ application protocols• Social media, peer-to-peer, voice, video• Web and enterprise applications, gaming• Custom applications• Frequent updates
Unprecedented Performance• 120 Gbps blended application traffic• 90M concurrent TCP sessions• 3M TCP sessions/second• 38 Gbps SSL bulk encryption
![Page 11: BreakingPoint & Stonesoft RSA Conference 2011 Presentation: Evaluating IPS](https://reader034.vdocuments.us/reader034/viewer/2022051515/54c418804a79596c2d8b4597/html5/thumbnails/11.jpg)
Validating Intrusion Prevention Systems
BreakingPoint Storm CTM
Blended Applications+
Live Security Strikes +
Extreme User Load+
Fault Injection/ Fuzzing
Intrusion Prevention System
REMEMBER TO EVALUATE:1. Performance Under Load + Attack2. Security Under Load + Attack3. Performance and Accuracy of Protocol Decoding4. Detection of Obfuscated Attacks5. Identify Memory Leakage
![Page 12: BreakingPoint & Stonesoft RSA Conference 2011 Presentation: Evaluating IPS](https://reader034.vdocuments.us/reader034/viewer/2022051515/54c418804a79596c2d8b4597/html5/thumbnails/12.jpg)
Questions and Answers
12